An Edge-Cloud Collaborative Cross-Domain Identity-Based Authentication Protocol with Privacy Protection  被引量:2

在线阅读下载全文

作  者:SUN Haipeng TAN Yu’an LI Congwu LEI Lei ZHANG Qikun HU Jingjing 

机构地区:[1]School of Computer Science and Technology,Beijing Institute of Technology,Beijing 100081,China [2]The 30th Research Institute of China Electronics Technology Group Corporation,Beijing 100088,China [3]China Electronic Science Research Institute of CETC,Beijing 100041,China [4]School of Computer and Communication Engineering,Zhengzhou University of Light Industry,Zhengzhou 450002,China

出  处:《Chinese Journal of Electronics》2022年第4期721-731,共11页电子学报(英文版)

基  金:supported by the National Key Research and Development Program of China(2020YFB1712101);the National Natural Science Foundation of China(61772070,61772477,61971380);the Key Technologies R&D Program of Henan Province(212102210089,212102210171,212102210075);the Collaborative Innovation Special Plan Project of Zhengzhou(2021ZDPY0206).

摘  要:Edge-cloud collaborative application scenario is more complex,it involves collaborative operations among different security domains,frequently accessing and exiting application system of mobile terminals.A cross-domain identity authentication protocol based on privacy protection is proposed.The main advantages of the protocol are as follows.1)Self-certified key generation algorithm:the public/private key pair of the mobile terminal is generated by the terminal members themselves.It avoids security risks caused by third-party key distribution and key escrow;2)Cross-domain identity authentication:the alliance keys are calculated among edge servers through blockchain technology.Cross-domain identity authentication is realized through the signature authentication of the alliance domain.The cross-domain authentication process is simple and efficient;3)Revocability of identity authentication:When the mobile terminal has logged off or exited the system,the legal identity of the terminal in the system will also become invalid immediately,so as to ensure the forward and backward security of accessing system resources.Under the hardness assumption of discrete logarithm problem and computational Diffie-Hellman problem,the security of the protocol is proven,and the efficiency of the protocol is verified.

关 键 词:Identity authentication Privacy protection Edge-cloud collaborative Revocability identity 

分 类 号:TN918.4[电子电信—通信与信息系统]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象