Privacy-preserving authentication scheme based on zero trust architecture

被引:4
|
作者
Tang, Fei [1 ,2 ]
Ma, Chunliang [1 ]
Cheng, Kefei [2 ]
机构
[1] Chongqing Univ Posts & Telecommun, Coll Comp Sci & Technol, Chongqing 400065, Peoples R China
[2] Chongqing Univ Posts & Telecommun, Sch Cyber Secur & Informat Law, Chongqing 400065, Peoples R China
基金
中国国家自然科学基金;
关键词
Zero trust architecture; Privacy-preserving; Authentication; Anonymity revocation; VERIFIER SIGNATURE SCHEME; SECURE;
D O I
10.1016/j.dcan.2023.01.021
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Zero trust architecture is an end-to-end approach for server resources and data security which contains identity authentication, access control, dynamic evaluation, and so on. This work focuses on authentication technology in the zero trust network. In this paper, a Traceable Universal Designated Verifier Signature (TUDVS) is used to construct a privacy-preserving authentication scheme for zero trust architecture. Specifically, when a client requests access to server resources, we want to protect the client's access privacy which means that the server administrator cannot disclose the client's access behavior to any third party. In addition, the security of the proposed scheme is proved and its efficiency is analyzed. Finally, TUDVS is applied to the single packet authorization scenario of the zero trust architecture to prove the practicability of the proposed scheme.
引用
收藏
页码:1211 / 1220
页数:10
相关论文
共 50 条
  • [21] Privacy-preserving authentication scheme with full aggregation in VANET
    Zhong, Hong
    Han, Shunshun
    Cui, Jie
    Zhang, Jing
    Xu, Yan
    INFORMATION SCIENCES, 2019, 476 : 211 - 221
  • [22] A Secure, Privacy-Preserving, and Lightweight Authentication Scheme for VANETs
    Nandy, Tarak
    Idris, Mohd Yamani Idna
    Noor, Rafidah Md
    Wahab, Ainuddin Wahid Abdul
    Bhattacharyya, Sananda
    Kolandaisamy, Raenu
    Yahuza, Muktar
    IEEE SENSORS JOURNAL, 2021, 21 (18) : 20998 - 21011
  • [23] Efficient and privacy-preserving online face authentication scheme
    Li M.
    Yang X.
    Zhu H.
    Wang F.
    Li Q.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (05): : 205 - 215
  • [24] Privacy-Preserving Authentication Scheme for Connected Autonomous Vehicles
    Karabulut-Kurt, Gunes
    Nari-Baykal, Kubra
    Ozdemir, Enver
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (06) : 4998 - 5010
  • [25] An efficient privacy-preserving authentication scheme that mitigates TA dependency in VANETs
    Su, Huadong
    Dong, Shi
    Wang, Ning
    Zhang, Ting
    VEHICULAR COMMUNICATIONS, 2024, 45
  • [26] An efficient conditional privacy-preserving authentication scheme with scalable revocation for VANETs
    Shen, Leyan
    Wang, Liangliang
    Zhang, Kai
    Li, Jinguo
    Chen, Kefei
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 133
  • [27] Privacy-Preserving Authentication Scheme for Connected Electric Vehicles Using Blockchain and Zero Knowledge Proofs
    Gabay, David
    Akkaya, Kemal
    Cebe, Mumin
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) : 5760 - 5772
  • [28] A Blockchain-based Privacy-Preserving Scheme for Cross-domain Authentication
    Jiang, Junfeng
    Zhang, Yujian
    Li, Junhao
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 992 - 999
  • [29] Privacy-Preserving Authentication Based on PUF for VANETs
    Li, Lihui
    Deng, Hanwen
    Zhai, Zhongyi
    Peng, Sheng-Lung
    FUTURE INTERNET, 2024, 16 (09)
  • [30] A Hybrid Blockchain-Based Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
    Su, Huadong
    Dong, Shi
    Zhang, Ting
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (11) : 17059 - 17072