期刊文献+
共找到147篇文章
< 1 2 8 >
每页显示 20 50 100
移动跨域单点登录系统设计 被引量:10
1
作者 邓昀 程小辉 《计算机工程与设计》 CSCD 北大核心 2010年第8期1667-1672,共6页
通过分析单点登录技术在移动电子商务中的重要性和单点登录技术的实现原理,提出了适用于移动环境的跨域单点登录系统整体架构。针对移动设备运算能力有限以及移动网络的不稳定性,提出了改进的基于公钥基础设施PKI的数据加密、数字签名... 通过分析单点登录技术在移动电子商务中的重要性和单点登录技术的实现原理,提出了适用于移动环境的跨域单点登录系统整体架构。针对移动设备运算能力有限以及移动网络的不稳定性,提出了改进的基于公钥基础设施PKI的数据加密、数字签名和分布式认证技术,实现了移动用户的域内认证和跨域认证。最后,在上述分析和研究基础上,使用基于JAX-WS模型的Web服务、Oracle9i数据库和Bouncy Castle轻量级API中的基于RSA的公钥算法,在J2ME和JavaEE5.0平台下对移动跨域单点登录系统进行了具体设计,并进行了测试。 展开更多
关键词 单点登录 公钥基础设施 分布式认证 域内认证 跨域认证 WEB服务
下载PDF
基于无证书签名的云端跨域身份认证方案 被引量:9
2
作者 杨小东 安发英 +2 位作者 杨平 刘婷婷 王彩芬 《计算机工程》 CAS CSCD 北大核心 2017年第11期128-133,145,共7页
针对基于无证书的身份认证方案无法满足跨域匿名认证需求的不足,利用双线性映射提出一种云环境下的跨域身份认证方案。基于无证书签名的合法性和消息的有效性,实现用户与云服务提供商的身份真实性鉴别,并在双向跨域认证过程中完成会话... 针对基于无证书的身份认证方案无法满足跨域匿名认证需求的不足,利用双线性映射提出一种云环境下的跨域身份认证方案。基于无证书签名的合法性和消息的有效性,实现用户与云服务提供商的身份真实性鉴别,并在双向跨域认证过程中完成会话密钥的协商。引入分层ID树结构确保身份的唯一性,"口令+密钥"的双因子认证过程增强跨域身份认证方案的安全性。利用临时身份实现用户身份的匿名性,对用户的恶意匿名行为具有可控性。分析结果表明,该认证方案在CK模型中是安全的,并能抵抗伪造、重放与替换攻击,具有较高的安全性。 展开更多
关键词 云计算 跨域 无证书签名 身份认证 CK模型 匿名性
下载PDF
边缘计算与区块多链下的安全可信认证模型 被引量:5
3
作者 黄敏敏 袁凌云 +1 位作者 潘雪 张杰 《计算机科学与探索》 CSCD 北大核心 2023年第3期733-747,共15页
边缘计算模式引发的数据安全和隐私保护等问题是制约边缘计算发展的基础性问题,而区块链因自身扩展性瓶颈,在解决边缘计算中的安全问题时受到了限制。为了解决边缘侧的信任管理及区块链的扩展性问题,促进边缘计算与区块链协同发展,基于... 边缘计算模式引发的数据安全和隐私保护等问题是制约边缘计算发展的基础性问题,而区块链因自身扩展性瓶颈,在解决边缘计算中的安全问题时受到了限制。为了解决边缘侧的信任管理及区块链的扩展性问题,促进边缘计算与区块链协同发展,基于边缘计算与主从多链提出了分布式安全可信认证模型。首先,基于传统单链设计了主从多链结构,并集成边缘计算部署了三层体系架构;针对边缘侧的安全性问题,基于椭圆曲线加密算法(ECC)集成区块链加密技术设计了签名认证方案。其次,基于角色的访问控制模型(RBAC)结合智能合约对用户权限进行了细粒度划分,构建了域间访问控制模型(ID-RBAC),并给出了域内、域间详细的访问认证流程设计。实验结果表明,该模型安全可信,与传统部署方式的单链架构相比,该方案存储开销平均下降50%,时延也有明显的降低。与现有方案相比,该方案在吞吐量方面有更大的优越性,发送速率与吞吐量之比达到1∶1,能满足大规模物联网实际应用需求,具有高扩展性、高安全性。 展开更多
关键词 边缘计算 区块多链 跨域 身份认证 信任管理
下载PDF
基于票据的跨域单点登录 被引量:8
4
作者 王国伟 薛曼君 《计算机应用》 CSCD 北大核心 2012年第6期1766-1768,1773,共4页
针对单点登录中的跨域身份认证问题,提出了一种基于票据的解决方案,以地址重定向的方式传递加密用户登录信息,异域应用系统获取用户信息并提供数据操作服务。使用随机数字生成票据,并作为生成传统加密算法会话密钥的参数,采用现代加密... 针对单点登录中的跨域身份认证问题,提出了一种基于票据的解决方案,以地址重定向的方式传递加密用户登录信息,异域应用系统获取用户信息并提供数据操作服务。使用随机数字生成票据,并作为生成传统加密算法会话密钥的参数,采用现代加密算法实现异域系统之间的互信并安全传递票据,异域应用系统根据票据产生会话密钥,加密并传输用户登录信息,每次会话产生新的密钥。通过对票据产生和传输以及密钥的安全性分析,可以实现跨域单点登录的功能并保证身份认证安全可信。 展开更多
关键词 单点登录 跨域 密钥 认证 票据
下载PDF
基于可变Cookie的跨域单点登录 被引量:7
5
作者 王国伟 薛曼君 《计算机工程与设计》 CSCD 北大核心 2012年第8期2931-2935,共5页
针对单点登录中的跨域身份认证问题,提出了一种基于可变Cookie的方案解决跨域单点登录,使用随机数字生成票据,并作为传统加密算法的会话密钥对客户端的Cookie进行加密,采用现代加密算法在异域系统之间安全传递票据,每次认证产生新的票... 针对单点登录中的跨域身份认证问题,提出了一种基于可变Cookie的方案解决跨域单点登录,使用随机数字生成票据,并作为传统加密算法的会话密钥对客户端的Cookie进行加密,采用现代加密算法在异域系统之间安全传递票据,每次认证产生新的票据并更新异域应用系统的Cookie。通过对票据产生和传输以及Cookie加密和常见攻击的安全性分析,可以实现跨域单点登录的功能并保证身份认证安全可信。 展开更多
关键词 单点登录 跨域 COOKIE 认证 票据 SOA WEBSERVICE
下载PDF
一种基于信任度的跨异构域动态认证机制 被引量:7
6
作者 裴俐春 陈性元 +2 位作者 王婷 张斌 徐震 《计算机应用》 CSCD 北大核心 2008年第6期1382-1384,共3页
为了适应大规模网络环境下异构域认证机制不一致、域间信任关系动态变化的特点,提出了一种基于信任度的跨异构域的动态认证方法,该方法根据交易双方的满意度打分来计算信任值,动态地建立域间信任关系。应用实例表明,该方法能够有效解决... 为了适应大规模网络环境下异构域认证机制不一致、域间信任关系动态变化的特点,提出了一种基于信任度的跨异构域的动态认证方法,该方法根据交易双方的满意度打分来计算信任值,动态地建立域间信任关系。应用实例表明,该方法能够有效解决跨域认证中域间信任关系的建立问题。 展开更多
关键词 信任度 异构域 动态认证
下载PDF
A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles
7
作者 Feng Zhao Hongtao Ding +3 位作者 Chunhai Li Zhaoyu Su Guoling Liang Changsong Yang 《Computers, Materials & Continua》 SCIE EI 2024年第7期567-585,共19页
The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and varia... The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and variable nature of its network topology,vehicles frequently engage in cross-domain interactions.During such processes,directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers,thus compromising the security of the cross-domain authentication process.Additionally,IoV imposes high real-time requirements,and existing cross-domain authentication schemes for IoV often encounter efficiency issues.To mitigate these challenges,we propose CAIoV,a blockchain-based efficient cross-domain authentication scheme for IoV.This scheme comprehensively integrates technologies such as zero-knowledge proofs,smart contracts,and Merkle hash tree structures.It divides the cross-domain process into anonymous cross-domain authentication and safe cross-domain authentication phases to ensure efficiency while maintaining a balance between efficiency and security.Finally,we evaluate the performance of CAIoV.Experimental results demonstrate that our proposed scheme reduces computational overhead by approximately 20%,communication overhead by around 10%,and storage overhead by nearly 30%. 展开更多
关键词 Blockchain cross-domain authentication internet of vehicle zero-knowledge proof
下载PDF
A Post-Quantum Cross-Domain Authentication Scheme Based on Multi-Chain Architecture
8
作者 Yi-Bo Cao Xiu-Bo Chen +6 位作者 Yun-Feng He Lu-Xi Liu Yin-Mei Che Xiao Wang Ke Xiao Gang Xu Si-Yi Chen 《Computers, Materials & Continua》 SCIE EI 2024年第2期2813-2827,共15页
Due to the rapid advancements in network technology,blockchain is being employed for distributed data storage.In the Internet of Things(IoT)scenario,different participants manage multiple blockchains located in differ... Due to the rapid advancements in network technology,blockchain is being employed for distributed data storage.In the Internet of Things(IoT)scenario,different participants manage multiple blockchains located in different trust domains,which has resulted in the extensive development of cross-domain authentication techniques.However,the emergence of many attackers equipped with quantum computers has the potential to launch quantum computing attacks against cross-domain authentication schemes based on traditional cryptography,posing a significant security threat.In response to the aforementioned challenges,our paper demonstrates a post-quantum cross-domain identity authentication scheme to negotiate the session key used in the cross-chain asset exchange process.Firstly,our paper designs the hiding and recovery process of user identity index based on lattice cryptography and introduces the identity-based signature from lattice to construct a post-quantum cross-domain authentication scheme.Secondly,our paper utilizes the hashed time-locked contract to achieves the cross-chain asset exchange of blockchain nodes in different trust domains.Furthermore,the security analysis reduces the security of the identity index and signature to Learning With Errors(LWE)and Short Integer Solution(SIS)assumption,respectively,indicating that our scheme has post-quantum security.Last but not least,through comparison analysis,we display that our scheme is efficient compared with the cross-domain authentication scheme based on traditional cryptography. 展开更多
关键词 Cross-domain identity authentication lattice-based cryptography blockchain hashed time-locked contract
下载PDF
A Trust Evaluation Mechanism Based on Autoencoder Clustering Algorithm for Edge Device Access of IoT
9
作者 Xiao Feng Zheng Yuan 《Computers, Materials & Continua》 SCIE EI 2024年第2期1881-1895,共15页
First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism... First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism based on the time decay factor is proposed,taking into account the influence of historical interaction records.We weight the time attenuation factor to each historical interaction record for updating and got the new historical record data.We refer to the beta distribution to enhance the flexibility and adaptability of the direct trust assessment model to better capture time trends in the historical record.Then we propose an autoencoder-based trust clustering algorithm.We perform feature extraction based on autoencoders.Kullback leibler(KL)divergence is used to calculate the reconstruction error.When constructing a convolutional autoencoder,we introduce convolutional neural networks to improve training efficiency and introduce sparse constraints into the hidden layer of the autoencoder.The sparse penalty term in the loss function measures the difference through the KL divergence.Trust clustering is performed based on the density based spatial clustering of applications with noise(DBSCAN)clustering algorithm.During the clustering process,edge nodes have a variety of trustworthy attribute characteristics.We assign different attribute weights according to the relative importance of each attribute in the clustering process,and a larger weight means that the attribute occupies a greater weight in the calculation of distance.Finally,we introduced adaptive weights to calculate comprehensive trust evaluation.Simulation experiments prove that our trust evaluation mechanism has excellent reliability and accuracy. 展开更多
关键词 Cross-domain authentication trust evaluation autoencoder
下载PDF
一种基于主从链的跨域身份认证算法
10
作者 王正 戴煜洲 +1 位作者 廖丹 张明 《通信技术》 2024年第1期72-79,共8页
为了抵御身份伪造攻击和解决认证效率低的问题,提出了一种基于主从链的跨域身份认证算法(Cross-domain identity Authentication algorithm based on the Master-Slave chain,CAMS)。该算法基于区块链技术利用主从链方式实现了车辆数据... 为了抵御身份伪造攻击和解决认证效率低的问题,提出了一种基于主从链的跨域身份认证算法(Cross-domain identity Authentication algorithm based on the Master-Slave chain,CAMS)。该算法基于区块链技术利用主从链方式实现了车辆数据的跨域存储和共享,从而提高了跨域身份认证效率。此外,CAMS算法在跨域认证过程中引入了假名的生成和验证参数。在验证消息之前,进一步验证车辆身份,确保认证身份的匿名性,抵御身份伪造攻击。仿真结果表明,CAMS在计算开销和认证效率方面具有较好的性能。 展开更多
关键词 跨域 身份验证 主从链 车联网
下载PDF
Blockchain-Based Certificateless Cross-Domain Authentication Scheme in the Industrial Internet of Things
11
作者 Zhaobin Li Xiantao Liu +1 位作者 Nan Zhang Zhanzhen Wei 《Computers, Materials & Continua》 SCIE EI 2024年第9期3835-3854,共20页
The Industrial Internet of Things(IIoT)consists of massive devices in different management domains,and the lack of trust among cross-domain entities leads to risks of data security and privacy leakage during informati... The Industrial Internet of Things(IIoT)consists of massive devices in different management domains,and the lack of trust among cross-domain entities leads to risks of data security and privacy leakage during information exchange.To address the above challenges,a viable solution that combines Certificateless Public Key Cryptography(CL-PKC)with blockchain technology can be utilized.However,as many existing schemes rely on a single Key Generation Center(KGC),they are prone to problems such as single points of failure and high computational overhead.In this case,this paper proposes a novel blockchain-based certificateless cross-domain authentication scheme,that integrates the threshold secret sharing mechanism without a trusted center,meanwhile,adopts blockchain technology to enable cross-domain entities to authenticate with each other and to negotiate session keys securely.This scheme also supports the dynamic joining and removing of multiple KGCs,ensuring secure and efficient cross-domain authentication and key negotiation.Comparative analysiswith other protocols demonstrates that the proposed cross-domain authentication protocol can achieve high security with relatively lowcomputational overhead.Moreover,this paper evaluates the scheme based on Hyperledger Fabric blockchain environment and simulates the performance of the certificateless scheme under different threshold parameters,and the simulation results show that the scheme has high performance. 展开更多
关键词 IIoT blockchain CERTIFICATELESS cross-domain authentication
下载PDF
基于PKI/CA的分布式跨域信任平台研究与实现 被引量:5
12
作者 颜海龙 喻建平 +1 位作者 胡强 冯纪强 《计算机工程与设计》 CSCD 北大核心 2013年第2期686-690,共5页
为了支持多CA环境下的跨信任域认证,实现数字证书互认,构建了基于PKI/CA技术体系的分布式跨域信任平台。设计了该平台的系统结构框架,主要包括可信CA管理与可信CA控制两部分。详细分析了两个子系统的主要功能结构和工作流程,并探讨了平... 为了支持多CA环境下的跨信任域认证,实现数字证书互认,构建了基于PKI/CA技术体系的分布式跨域信任平台。设计了该平台的系统结构框架,主要包括可信CA管理与可信CA控制两部分。详细分析了两个子系统的主要功能结构和工作流程,并探讨了平台实现的关键技术机制。结合深圳电子政务实际需求,开发了平台原型系统。应用实例表明,该平台具有较强的灵活性和可扩展性,能够有效解决不同认证体系下的数字证书兼容应用问题。 展开更多
关键词 公钥基础设施 数字证书 跨域 认证 信任平台
下载PDF
跨域访问控制与边界防御方法研究 被引量:5
13
作者 邹翔 金波 倪力舜 《计算机应用研究》 CSCD 北大核心 2010年第4期1481-1483,共3页
为保障跨域访问过程中的信息网络安全,在深入分析其所面临安全风险的基础上,提出了一种跨域访问控制与边界防御模型,该模型将跨域访问过程划分为域内和跨域两个阶段,同时结合相关安全技术进行策略决策和策略实施,保障了信息传输的保密... 为保障跨域访问过程中的信息网络安全,在深入分析其所面临安全风险的基础上,提出了一种跨域访问控制与边界防御模型,该模型将跨域访问过程划分为域内和跨域两个阶段,同时结合相关安全技术进行策略决策和策略实施,保障了信息传输的保密性、完整性和可用性,从而有效地解决了跨域访问过程中的访问控制和边界防御问题。 展开更多
关键词 访问控制 安全域 边界防御 身份认证 安全策略
下载PDF
无侵入式Web平台集成自动认证机制的设计与实现
14
作者 邵瑛 徐斌 《微型电脑应用》 2023年第8期5-8,共4页
单点登录是多Web平台集成时常用的统一认证方案,它对Web平台是侵入式的,需要各Web平台在代码上的支持,不适合已经成型的系统。针对该问题提出了一种无侵入式的第三方Web平台自动认证机制,该机制基于私有域名,采用认证代理适配器实现后端... 单点登录是多Web平台集成时常用的统一认证方案,它对Web平台是侵入式的,需要各Web平台在代码上的支持,不适合已经成型的系统。针对该问题提出了一种无侵入式的第三方Web平台自动认证机制,该机制基于私有域名,采用认证代理适配器实现后端Web平台的域名绑定及登录认证。为实现认证过程中私有域名的自动解析,提出基于Web的动态私有域名机制,避免客户端需频繁手动修改Hosts文件来解析私有域名的问题。提出的无侵入式自动认证机制具有广泛的实用性。 展开更多
关键词 WEB平台 域名 自动认证 认证代理适配器
下载PDF
Cross-domain identity authentication scheme based on blockchain and PKI system
15
作者 Hai Zhang Feng Zhao 《High-Confidence Computing》 2023年第1期8-17,共10页
In vehicular ad hoc networks(VANET),the cross-domain identity authentication of users is very important for the development of VANET due to the large cross-domain mobility of vehicle users.The Public Key Infrastructur... In vehicular ad hoc networks(VANET),the cross-domain identity authentication of users is very important for the development of VANET due to the large cross-domain mobility of vehicle users.The Public Key Infrastructure(PKI)system is often used to solve the identity authentication and security trust problems faced by VANET.However,the PKI system has challenges such as too centralized Authority of Certification Authority(CA),frequent cross-domain access to certificate interactions and high authentication volume,leading to high certificate management costs,complex cross-domain authentication paths,easy privacy leakage,and overburdened networks.To address these problems,this paper proposes a lightweight blockchain-based PKI identity management and authentication architecture that uses smart contracts to reduce the heavy burden caused by CAs directly managing the life cycle of digital certificates.On this basis,a trust chain based on smart contracts is designed to replace the traditional CA trust chain to meet the general cross-domain requirements,to effectively avoid the communication pressure caused by a mass of certificate transmissions.For the cross-domain scenario with higher privacy and security requirements the identity attribute authentication service is provided directly while protecting privacy by using the Merkle tree to anchor identity attribute data on and off the blockchain chain.Finally,the proposed scheme was comprehensively analyzed in terms of cost,time consumption and security. 展开更多
关键词 Vehicular ad hoc network PKI Blockchain Cross-domain authentication
原文传递
Cross-Domain Authentication Scheme Based on Blockchain and Consistent Hash Algorithm for System-Wide Information Management
16
作者 Lizhe Zhang Yongqiang Huang +1 位作者 Jia Nie Kenian Wang 《Computers, Materials & Continua》 SCIE EI 2023年第11期1467-1488,共22页
System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation ai... System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation air operations,users accessing different authentication domains in the SWIM system have problems with the validity,security,and privacy of SWIM-shared data.In order to solve these problems,this paper proposes a SWIM crossdomain authentication scheme based on a consistent hashing algorithm on consortium blockchain and designs a blockchain certificate format for SWIM cross-domain authentication.The scheme uses a consistent hash algorithm with virtual nodes in combination with a cluster of authentication centers in the SWIM consortium blockchain architecture to synchronize the user’s authentication mapping relationships between authentication domains.The virtual authentication nodes are mapped separately using different services provided by SWIM to guarantee the partitioning of the consistent hash ring on the consortium blockchain.According to the dynamic change of user’s authentication requests,the nodes of virtual service authentication can be added and deleted to realize the dynamic load balancing of cross-domain authentication of different services.Security analysis shows that this protocol can resist network attacks such as man-in-the-middle attacks,replay attacks,and Sybil attacks.Experiments show that this scheme can reduce the redundant authentication operations of identity information and solve the problems of traditional cross-domain authentication with single-point collapse,difficulty in expansion,and uneven load.At the same time,it has better security of information storage and can realize the cross-domain authentication requirements of SWIM users with low communication costs and system overhead.KEYWORDS System-wide information management(SWIM);consortium blockchain;consistent hash;cross-domain authentication;load balancing. 展开更多
关键词 System-wide information management(SWIM) consortium blockchain consistent hash cross-domain authentication load balancing
下载PDF
BLECA: A Blockchain-Based Lightweight and Efficient Cross-Domain Authentication Scheme for Smart Parks
17
作者 Fengting Luo Ruwei Huang Yuyue Chen 《Computers, Materials & Continua》 SCIE EI 2023年第11期1815-1835,共21页
Smart parks serve as integral components of smart cities,where they play a pivotal role in the process of urban modernization.The demand for cross-domain cooperation among smart devices from various parks has witnesse... Smart parks serve as integral components of smart cities,where they play a pivotal role in the process of urban modernization.The demand for cross-domain cooperation among smart devices from various parks has witnessed a significant increase.To ensure secure communication,device identities must undergo authentication.The existing cross-domain authentication schemes face issues such as complex authentication paths and high certificate management costs for devices,making it impractical for resource-constrained devices.This paper proposes a blockchain-based lightweight and efficient cross-domain authentication protocol for smart parks,which simplifies the authentication interaction and requires every device to maintain only one certificate.To enhance cross-domain cooperation flexibility,a comprehensive certificate revocation mechanism is presented,significantly reducing certificate management costs while ensuring efficient and secure identity authentication.When a park needs to revoke access permissions of several cooperative partners,the revocation of numerous cross-domain certificates can be accomplished with a single blockchain write operation.The security analysis and experimental results demonstrate the security and effectiveness of our scheme. 展开更多
关键词 Cross-domain authentication blockchain smart parks Certificate Authority(CA) distributed collaboration Internet of Things(IoT)
下载PDF
BIdM:A Blockchain-Enabled Cross-Domain Identity Management System 被引量:2
18
作者 Ruibiao Chen Fangxing Shu +4 位作者 Shuokang Huang Lei Huang Huafang Liu Jin Liu Kai Lei 《Journal of Communications and Information Networks》 CSCD 2021年第1期44-58,共15页
Reliable identity management and authentication are significant for network security.In recent years,as traditional centralized identity management systems suffer from security and scalability problems,decentralized i... Reliable identity management and authentication are significant for network security.In recent years,as traditional centralized identity management systems suffer from security and scalability problems,decentralized identity management has received considerable attention in academia and industry.However,with the increasing sharing interaction among each domain,management and authentication of decentralized identity has raised higher requirements for cross-domain trust and faced implementation challenges galore.To solve these problems,we propose BIdM,a decentralized crossdomain identity management system based on blockchain.We design a decentralized identifier(DID)for naming identities based on the consortium blockchain technique.Since the identity subject fully controls the life cycle and ownership of the proposed DID,it can be signed and issued without a central authentication node’s intervention.Simultaneously,every node in the system can participate in identity authentication and trust establishment,thereby solving the centralized mechanism’s single point of failure problem.To further improve authentication efficiency and protect users’privacy,BIdM introduces a one-way accumulator as an identity data structure,which guarantees the validity of entity identity.We theoretically analyze the feasibility and performance of BIdM and conduct evaluations on a prototype implementation.The experimental results demonstrate that BIdM achieves excellent optimization on cross-domain authentication compared with existing identity management systems. 展开更多
关键词 decentralized identifier blockchain oneway accumulator cross-domain authentication identity management
原文传递
Cross-heterogeneous Domain Authentication Scheme Based on Blockchain 被引量:2
19
作者 Jing Liu Yixin Liu +3 位作者 Yingxu Lai Rongchen Li Siyu Wu Sami Mian 《Journal of Artificial Intelligence and Technology》 2021年第2期92-100,共9页
With the rising popularity of the Internet and the development of big data technology,an increasing number of organizations are opting to cooperate across domains to maximize their benefits.Most organizations use publ... With the rising popularity of the Internet and the development of big data technology,an increasing number of organizations are opting to cooperate across domains to maximize their benefits.Most organizations use public key infrastructure to ensure security in accessing their data and applications.However,with the continuous development of identity-based encryption(IBE)technology,small-and medium-sized enterprises are increasingly using IBE to deploy internal authentication systems.To solve the problems that arise when crossing heterogeneous authentication domains and to guarantee the security of the certification process,we propose using blockchain technology to establish a reliable cross-domain authentication scheme.Using the distributed and tamper-resistant characteristics of the blockchain,we design a cross-domain authentication model based on blockchain to guarantee the security of the heterogeneous authentication process and present a cross-domain authentication protocol based on blockchain.This model does not change the internal trust structure of each authentication domain and is highly scalable.Furthermore,on the premise of ensuring security,the process of verifying the signature of the root certificate in the traditional cross-domain authentication protocol is improved to verify the hash value of the root certificate,thereby improving the authentication efficiency.The developed prototype exhibits generality and simplicity compared to previous methods. 展开更多
关键词 public key infrastructure identity-based encryption cross-domain authentication blockchain
下载PDF
Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
20
作者 Debnath BHATTACHARYYA Jhuma DUTTA +2 位作者 Poulami DAS Samir Kumar BANDYOPADHYAY Tai-hoon KIM 《International Journal of Communications, Network and System Sciences》 2009年第5期363-370,共8页
In this paper a novel technique, Authentication and Secret Message Transmission using Discrete Fourier Transformation (ASMTDFT) has been proposed to authenticate an image and also some secret message or image can be t... In this paper a novel technique, Authentication and Secret Message Transmission using Discrete Fourier Transformation (ASMTDFT) has been proposed to authenticate an image and also some secret message or image can be transmitted over the network. Instead of direct embedding a message or image within the source image, choosing a window of size 2 x 2 of the source image in sliding window manner and then con-vert it from spatial domain to frequency domain using Discrete Fourier Transform (DFT). The bits of the authenticating message or image are then embedded at LSB within the real part of the transformed image. Inverse DFT is performed for the transformation from frequency domain to spatial domain as final step of encoding. Decoding is done through the reverse procedure. The experimental results have been discussed and compared with the existing steganography algorithm S-Tools. Histogram analysis and Chi-Square test of source image with embedded image shows the better results in comparison with the S-Tools. 展开更多
关键词 Data Hiding authentication Frequency domain DISCRETE FOURIER Transformation (DFT) INVERSE DISCRETE FOURIER TRANSFORM (IDFT) S-Tools
下载PDF
上一页 1 2 8 下一页 到第
使用帮助 返回顶部