Jisuanji kexue (Nov 2021)

CFL_BLP_BC Model Based on Authentication and Blockchain

  • LIAN Wen-juan, ZHAO Duo-duo, FAN Xiu-bin, GENG Yu-nian, FAN Xin-tong

DOI
https://doi.org/10.11896/jsjkx.201000002
Journal volume & issue
Vol. 48, no. 11
pp. 36 – 45

Abstract

Read online

The coming of 5G era brings new challenges to the information security of emerging information industries.The exis-ting security technologies can't meet the requirements of millisecond level authentication and trusted authentication for specific scenarios in 5G era.Therefore,CFL technology is taken as the origin technology of information security.Based on the local modification of the security axioms of the original BLP model,combined with the Blockchain technology,CFL_BLP_BC model formally describes the basic elements,security axioms and state transition rules of the model.The model can support the construction of five aspects of information security,and has the attributes of millisecond level,instruction level and empirical system.The model belongs to endogenous safety,innate immunity and active defense technology.The model can provide important theoretical gui-dance for theemerging information industry.

Keywords