检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:SUN Haipeng TAN Yu’an LI Congwu LEI Lei ZHANG Qikun HU Jingjing
机构地区:[1]School of Computer Science and Technology,Beijing Institute of Technology,Beijing 100081,China [2]The 30th Research Institute of China Electronics Technology Group Corporation,Beijing 100088,China [3]China Electronic Science Research Institute of CETC,Beijing 100041,China [4]School of Computer and Communication Engineering,Zhengzhou University of Light Industry,Zhengzhou 450002,China
出 处:《Chinese Journal of Electronics》2022年第4期721-731,共11页电子学报(英文版)
基 金:supported by the National Key Research and Development Program of China(2020YFB1712101);the National Natural Science Foundation of China(61772070,61772477,61971380);the Key Technologies R&D Program of Henan Province(212102210089,212102210171,212102210075);the Collaborative Innovation Special Plan Project of Zhengzhou(2021ZDPY0206).
摘 要:Edge-cloud collaborative application scenario is more complex,it involves collaborative operations among different security domains,frequently accessing and exiting application system of mobile terminals.A cross-domain identity authentication protocol based on privacy protection is proposed.The main advantages of the protocol are as follows.1)Self-certified key generation algorithm:the public/private key pair of the mobile terminal is generated by the terminal members themselves.It avoids security risks caused by third-party key distribution and key escrow;2)Cross-domain identity authentication:the alliance keys are calculated among edge servers through blockchain technology.Cross-domain identity authentication is realized through the signature authentication of the alliance domain.The cross-domain authentication process is simple and efficient;3)Revocability of identity authentication:When the mobile terminal has logged off or exited the system,the legal identity of the terminal in the system will also become invalid immediately,so as to ensure the forward and backward security of accessing system resources.Under the hardness assumption of discrete logarithm problem and computational Diffie-Hellman problem,the security of the protocol is proven,and the efficiency of the protocol is verified.
关 键 词:Identity authentication Privacy protection Edge-cloud collaborative Revocability identity
分 类 号:TN918.4[电子电信—通信与信息系统]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.222