Privacy-preserving authentication scheme based on zero trust architecture  

在线阅读下载全文

作  者:Fei Tang Chunliang Ma Kefei Cheng 

机构地区:[1]College of Computer Science and Technology,Chongqing University of Posts and Telecommunications,Chongqing,400065,China [2]School of Cyber Security and Information Law,Chongqing University of Posts and Telecommunications,Chongqing 400065,China

出  处:《Digital Communications and Networks》2024年第5期1211-1220,共10页数字通信与网络(英文版)

基  金:supported in part by the National Natural Science Foundation of China(No.61702067);in part by the Natural Science Foundation of Chongqing(No.cstc2020jcyj-msxmX0343).

摘  要:Zero trust architecture is an end-to-end approach for server resources and data security which contains identity authentication,access control,dynamic evaluation,and so on.This work focuses on authentication technology in the zero trust network.In this paper,a Traceable Universal Designated Verifier Signature(TUDVS) is used to construct a privacy-preserving authentication scheme for zero trust architecture.Specifically,when a client requests access to server resources,we want to protect the client's access privacy which means that the server administrator cannot disclose the client's access behavior to any third party.In addition,the security of the proposed scheme is proved and its efficiency is analyzed.Finally,TUDVS is applied to the single packet authorization scenario of the zero trust architecture to prove the practicability of the proposed scheme.

关 键 词:Zero trust architecture PRIVACY-PRESERVING Authentication Anonymity revocation 

分 类 号:TP3[自动化与计算机技术—计算机科学与技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象