Skip to main content
Fig. 1 | EURASIP Journal on Wireless Communications and Networking

Fig. 1

From: An access control model for the Internet of Things based on zero-knowledge token and blockchain

Fig. 1

source of the attribute is confirmed by verifying the signature. The result of the permission ruling will return the subject a ZKToken encrypted by zero-knowledge proof in place of the subject's identity information for legitimate access to the resource, which records the subject's access rights and valid time

Access control model. The resource owner publishes the unique identifier and object property information of the device on the blockchain as the basis of fine-grained access control authority decision, stores it through a smart contract, and records the address of the property owner. When a user needs to authenticate the device's attribute information to access a private resource, the identity can be retrieved by invoking the smart contract authentication identifier to indicate ownership of the attribute. Then the smart contract verifies the attribute information to determine whether the user has the right to access the resource.When the attribute information is registered, the registration point will mark the subject identifier for the attribute information of the subject, and prove the ownership of the attribute through the digital signature generated by zero-knowledge proof. After the attribute information is written to the blockchain, each time the attribute information is called, the

Back to article page