2023
DOI: 10.3390/s23042000
|View full text |Cite
|
Sign up to set email alerts
|

A Scalable Cross-Chain Access Control and Identity Authentication Scheme

Abstract: Cross-chain is an emerging blockchain technology which builds the bridge across homogeneous and heterogeneous blockchains. However, due to the differentiation of different blockchains and the lack of access control and identity authentication of cross-chain operation subjects, existing cross-chain technologies are struggling to accomplish the identity transformation of cross-chain subjects between different chains, and also pose great challenges in terms of the traceability and supervision of dangerous transac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 18 publications
0
0
0
Order By: Relevance
“…It has been noticed that it becomes easy for attackers to grant access to those accounts and hack users' credentials. 'SailPoint' cloud platform for maintaining identity security helps users to realize the accesses and identities of all the secure information [2]. This identity management solution helps organizations easily manage digital identities, employee permissions, data access, information security, and compliance.…”
Section: Research Backgroundmentioning
confidence: 99%
See 1 more Smart Citation
“…It has been noticed that it becomes easy for attackers to grant access to those accounts and hack users' credentials. 'SailPoint' cloud platform for maintaining identity security helps users to realize the accesses and identities of all the secure information [2]. This identity management solution helps organizations easily manage digital identities, employee permissions, data access, information security, and compliance.…”
Section: Research Backgroundmentioning
confidence: 99%
“…It allows maintaining IAM standards to access the data that need to complete the job. Achieving identity authentication and access control in support of transaction circulation uses various types of changes which maintain low chain intrusion [2]. Moreover, with the assistance of the IAM scheme, it becomes easy to realize conversion based on cross-chain identity in the middle of recorded illegal transactions and different chains.…”
Section: Research Backgroundmentioning
confidence: 99%