Privacy-preserving authentication scheme based on zero trust architecture

被引:4
|
作者
Tang, Fei [1 ,2 ]
Ma, Chunliang [1 ]
Cheng, Kefei [2 ]
机构
[1] Chongqing Univ Posts & Telecommun, Coll Comp Sci & Technol, Chongqing 400065, Peoples R China
[2] Chongqing Univ Posts & Telecommun, Sch Cyber Secur & Informat Law, Chongqing 400065, Peoples R China
基金
中国国家自然科学基金;
关键词
Zero trust architecture; Privacy-preserving; Authentication; Anonymity revocation; VERIFIER SIGNATURE SCHEME; SECURE;
D O I
10.1016/j.dcan.2023.01.021
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Zero trust architecture is an end-to-end approach for server resources and data security which contains identity authentication, access control, dynamic evaluation, and so on. This work focuses on authentication technology in the zero trust network. In this paper, a Traceable Universal Designated Verifier Signature (TUDVS) is used to construct a privacy-preserving authentication scheme for zero trust architecture. Specifically, when a client requests access to server resources, we want to protect the client's access privacy which means that the server administrator cannot disclose the client's access behavior to any third party. In addition, the security of the proposed scheme is proved and its efficiency is analyzed. Finally, TUDVS is applied to the single packet authorization scenario of the zero trust architecture to prove the practicability of the proposed scheme.
引用
收藏
页码:1211 / 1220
页数:10
相关论文
共 50 条
  • [31] A review of privacy-preserving biometric identification and authentication protocols
    Zeng, Li
    Shen, Peisong
    Zhu, Xiaojie
    Tian, Xue
    Chen, Chi
    COMPUTERS & SECURITY, 2025, 150
  • [32] Anonymous and Efficient Authentication Scheme for Privacy-Preserving Distributed Learning
    Jiang, Yili
    Zhang, Kuan
    Qian, Yi
    Zhou, Liang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 2227 - 2240
  • [33] Privacy-preserving and tokenless chaotic revocable face authentication scheme
    Muhammad Khurram Khan
    Khaled Alghathbar
    Jiashu Zhang
    Telecommunication Systems, 2011, 47 : 227 - 234
  • [34] Efficient Certificateless Conditional Privacy-Preserving Authentication Scheme in VANETs
    Ming, Yang
    Cheng, Hongliang
    MOBILE INFORMATION SYSTEMS, 2019, 2019
  • [35] A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks
    Wang, Changji
    Yuan, Yuan
    Wu, Jiayuan
    SENSORS, 2017, 17 (06):
  • [36] An autonomous privacy-preserving authentication scheme for intelligent transportation systems
    Sucasas, Victor
    Mantas, Georgios
    Saghezchi, Firooz B.
    Radwan, Ayman
    Rodriguez, Jonathan
    COMPUTERS & SECURITY, 2016, 60 : 193 - 205
  • [37] Privacy-Preserving Subgraph Matching Scheme With Authentication in Social Networks
    Zuo, Xiangjian
    Li, Lixiang
    Peng, Haipeng
    Luo, Shoushan
    Yang, Yixian
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (03) : 2038 - 2049
  • [38] Privacy-preserving and tokenless chaotic revocable face authentication scheme
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    Zhang, Jiashu
    TELECOMMUNICATION SYSTEMS, 2011, 47 (3-4) : 227 - 234
  • [39] A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing
    Yassin, Ali A.
    Jin, Hai
    Ibrahim, Ayad
    Qiang, Weizhong
    Zou, Deqing
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 1210 - 1217
  • [40] A Lightweight Privacy-Preserving Authentication Scheme for Vehicle-to-Grid
    Shao, Huishuang
    Ma, Yiwei
    Shao, Binhai
    2024 6TH ASIA ENERGY AND ELECTRICAL ENGINEERING SYMPOSIUM, AEEES 2024, 2024, : 278 - 282