Privacy-preserving authentication scheme based on zero trust architecture
Tóm tắt
Từ khóa
Tài liệu tham khảo
Gilman, 2019
2021
Ward, 2014, BeyondCorp: a new approach to enterprise security, Login Mag. USENIX Sage, 39, 6
Rose, 2020
DeCusatis, 2016, Implementing zero trust cloud networks with transport access control and first packet authentication, 5
Eidle, 2017, Autonomic security for zero trust networks, 288
Chen, 2020, A security awareness and protection system for 5G smart healthcare based on zero-trust architecture, IEEE Internet Things J., 8, 10248, 10.1109/JIOT.2020.3041042
Liu, 2022, A blockchain-based decentralized, fair and authenticated information sharing scheme in zero trust internet-of-things, IEEE Trans. Comput.
Wang, 2022, S-BDS: an effective blockchain-based data storage scheme in zero-trust IoT, ACM Trans. Internet Technol.
Bello, 2022, On sustained zero trust conceptualization security for mobile core networks in 5G and beyond, IEEE Trans. Netw. Serv. Manag., 19, 1876, 10.1109/TNSM.2022.3157248
Wang, 2022, Privacy-aware traffic flow prediction based on multi-party sensor data with zero trust in smart city, ACM Trans. Internet Technol.
Stern, 2021, ACED-IT: assuring confidential electronic design against insider threats in a zero trust environment, IEEE Trans. Comput. Aided Des. Integrated Circ. Syst., 41, 3202, 10.1109/TCAD.2021.3127864
Guo, 2020, Research on identity authentication mechanism of IoT devices based on zero trust architecture, Inf. Technol. Netw. Secur., 39, 23
Mehraj, 2020, Establishing a zero trust strategy in cloud computing enviroment, 1
Sultana, 2020, Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology, BMC Med. Inf. Decis. Making, 20, 1
Chen, 2016, A uniform identity authentication method based on cookie ticket, 134
Chaudhry, 2022, LAS-SG: an elliptic curve based lightweight authentication scheme for smart grid environments, IEEE Trans. Ind. Inf., 19, 1504, 10.1109/TII.2022.3158663
Gutmann, 2016, Zeta-zero-trust authentication: relying on innate human ability, not technology, 357
Shah, 2021, LCDA: lightweight continuous device-to-device authentication for a zero trust architecture (ZTA), Comput. Secur.
Sun, 2020, Building zero trust network based on multi-factor authentication, J. Bei Jing Inst. Technol., 36, 21
Zhang, 2019, Research on multi-server lightweight multi-factor authentication protocol in telemedicine environment, Inf. Netw. Secur., 10, 42
He, 2021, Research on the design of zero trust firewall based on single packet authorization, J. SW Minzu Univ. (Nat. Sci. Ed.), 47, 181
Chang, 2020, PKI security for identity-based signature scheme, IEEE Access, 17833, 10.1109/ACCESS.2020.2967904
Hwang, 2015, Short dynamic group signature scheme supporting controllable linkability, IEEE Trans. Inf. Forensics Secur., 10, 1109, 10.1109/TIFS.2015.2390497
Kurbatov, 2019, Using ring signatures for an anonymous E-voting system, 187
Huang, 2010, Ring signature scheme with revocable annoymity, Comput. Eng. Appl., 46, 88
Scafuro, 2021, One-time traceable ring signatures, 481
Steinfeld, 2003, Universal designated-verifier signatures, 523
Zhu, 2017, A universal designated multi-verifier transitive signature scheme, 180
Rastegari, 2019, Universal designated verifier signature scheme with non-delegatability in the standard model, Inf. Sci., 479, 321, 10.1016/j.ins.2018.12.020
Wang, 2020, A universal designated multi verifiers content extraction signature scheme, Int. J. Comput. Sci. Eng., 21, 49
Feng, 2016, Design and implementation of identity authentication system based on fingerprint recognition and cryptography, 254
Satam, 2020, Multi-level bluetooth intrusion detection system, 1
Zhang, 2005, Identity-based universal designated verifier signatures, 825
Goldwasser, 1988, A digital signature scheme secure against adaptive chosen-message attacks, SIAM J. Comput., 17, 281, 10.1137/0217017
Cao, 2009, An identity based universal designated verifier signature scheme secure in the standard model, J. Syst. Software, 82, 643, 10.1016/j.jss.2008.09.001
He, 2021, Research on the design of zero trust firewall based on single packet authorization, J. SW Minzu Univ. (Nat. Sci. Ed.), 47, 181