Privacy-preserving authentication scheme based on zero trust architecture

Digital Communications and Networks - Tập 10 Số 5 - Trang 1211-1220 - 2024
Fei Tang1,2, Chunliang Ma1, Kefei Cheng2
1College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
2School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Chongqing 400065, China

Tóm tắt

Từ khóa


Tài liệu tham khảo

Gilman, 2019

2021

Ward, 2014, BeyondCorp: a new approach to enterprise security, Login Mag. USENIX Sage, 39, 6

Rose, 2020

DeCusatis, 2016, Implementing zero trust cloud networks with transport access control and first packet authentication, 5

Eidle, 2017, Autonomic security for zero trust networks, 288

Chen, 2020, A security awareness and protection system for 5G smart healthcare based on zero-trust architecture, IEEE Internet Things J., 8, 10248, 10.1109/JIOT.2020.3041042

Liu, 2022, A blockchain-based decentralized, fair and authenticated information sharing scheme in zero trust internet-of-things, IEEE Trans. Comput.

Wang, 2022, S-BDS: an effective blockchain-based data storage scheme in zero-trust IoT, ACM Trans. Internet Technol.

Bello, 2022, On sustained zero trust conceptualization security for mobile core networks in 5G and beyond, IEEE Trans. Netw. Serv. Manag., 19, 1876, 10.1109/TNSM.2022.3157248

Wang, 2022, Privacy-aware traffic flow prediction based on multi-party sensor data with zero trust in smart city, ACM Trans. Internet Technol.

Stern, 2021, ACED-IT: assuring confidential electronic design against insider threats in a zero trust environment, IEEE Trans. Comput. Aided Des. Integrated Circ. Syst., 41, 3202, 10.1109/TCAD.2021.3127864

Guo, 2020, Research on identity authentication mechanism of IoT devices based on zero trust architecture, Inf. Technol. Netw. Secur., 39, 23

Mehraj, 2020, Establishing a zero trust strategy in cloud computing enviroment, 1

Sultana, 2020, Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology, BMC Med. Inf. Decis. Making, 20, 1

Chen, 2016, A uniform identity authentication method based on cookie ticket, 134

Chaudhry, 2022, LAS-SG: an elliptic curve based lightweight authentication scheme for smart grid environments, IEEE Trans. Ind. Inf., 19, 1504, 10.1109/TII.2022.3158663

Gutmann, 2016, Zeta-zero-trust authentication: relying on innate human ability, not technology, 357

Shah, 2021, LCDA: lightweight continuous device-to-device authentication for a zero trust architecture (ZTA), Comput. Secur.

Sun, 2020, Building zero trust network based on multi-factor authentication, J. Bei Jing Inst. Technol., 36, 21

Zhang, 2019, Research on multi-server lightweight multi-factor authentication protocol in telemedicine environment, Inf. Netw. Secur., 10, 42

He, 2021, Research on the design of zero trust firewall based on single packet authorization, J. SW Minzu Univ. (Nat. Sci. Ed.), 47, 181

Chang, 2020, PKI security for identity-based signature scheme, IEEE Access, 17833, 10.1109/ACCESS.2020.2967904

Hwang, 2015, Short dynamic group signature scheme supporting controllable linkability, IEEE Trans. Inf. Forensics Secur., 10, 1109, 10.1109/TIFS.2015.2390497

Kurbatov, 2019, Using ring signatures for an anonymous E-voting system, 187

Huang, 2010, Ring signature scheme with revocable annoymity, Comput. Eng. Appl., 46, 88

Scafuro, 2021, One-time traceable ring signatures, 481

Steinfeld, 2003, Universal designated-verifier signatures, 523

Zhu, 2017, A universal designated multi-verifier transitive signature scheme, 180

Rastegari, 2019, Universal designated verifier signature scheme with non-delegatability in the standard model, Inf. Sci., 479, 321, 10.1016/j.ins.2018.12.020

Wang, 2020, A universal designated multi verifiers content extraction signature scheme, Int. J. Comput. Sci. Eng., 21, 49

Feng, 2016, Design and implementation of identity authentication system based on fingerprint recognition and cryptography, 254

Satam, 2020, Multi-level bluetooth intrusion detection system, 1

Zhang, 2005, Identity-based universal designated verifier signatures, 825

Goldwasser, 1988, A digital signature scheme secure against adaptive chosen-message attacks, SIAM J. Comput., 17, 281, 10.1137/0217017

Cao, 2009, An identity based universal designated verifier signature scheme secure in the standard model, J. Syst. Software, 82, 643, 10.1016/j.jss.2008.09.001

He, 2021, Research on the design of zero trust firewall based on single packet authorization, J. SW Minzu Univ. (Nat. Sci. Ed.), 47, 181