2020
DOI: 10.1155/2020/2078032
|View full text |Cite
|
Sign up to set email alerts
|

Heterogeneous Cross-Domain Identity Authentication Scheme Based on Proxy Resignature in Cloud Environment

Abstract: Based on proxy resignature, the signature transformation between trust domains of different cryptographic systems is realized with the help of the cloud authentication center, so as to achieve cross-domain access between users and cloud service providers in heterogeneous environment. Hierarchical ID tree realizes the uniqueness of identity in communication, and the security of heterogeneous cross-domain identity authentication is enhanced by the two-factor authentication of “password + key” and temporary ident… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 18 publications
0
2
0
1
Order By: Relevance
“…Online centralized authentication has also made some progress (Zhao et al, 2022). Lv et al (2020) relies on the proxy analysis mode and using the methods of "password-key" and "temporary identity-real identity" to realize the transformation of password signatures between cloud centers. Zheng et al (2021) combines hash function with random numbers and other technologies to design an authentication protocol for telemedicine scenarios to ensure the security of users' private data.…”
Section: Related Researchmentioning
confidence: 99%
“…Online centralized authentication has also made some progress (Zhao et al, 2022). Lv et al (2020) relies on the proxy analysis mode and using the methods of "password-key" and "temporary identity-real identity" to realize the transformation of password signatures between cloud centers. Zheng et al (2021) combines hash function with random numbers and other technologies to design an authentication protocol for telemedicine scenarios to ensure the security of users' private data.…”
Section: Related Researchmentioning
confidence: 99%
“…In Ref. [1], a cross‐domain authentication scheme based on certificateless cryptosystem is proposed. This scheme combined with the PKI cryptographic system can anonymously track the identity of the terminal entity.…”
Section: Related Workmentioning
confidence: 99%
“…Pada tahun 2020, Lv dkk. merancang protokol autentikasi identitas antar domain berbasis tanda tangan digital, kemudian dianalisis menggunakan AVISPA [12]. Dari hasil analisis disimpulkan bahwa protokol yang dikembangkan oleh Lv dkk.…”
Section: Penelitian Terdahuluunclassified