2021 7th International Conference on Big Data Computing and Communications (BigCom) 2021
DOI: 10.1109/bigcom53800.2021.00007
|View full text |Cite
|
Sign up to set email alerts
|

A Certificate Authority Domain-based Cross-domain Authentication Scheme for Virtual Enterprise Using Identity Based Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…However, most of the traditional schemes are PKI-based and IBC-based. Zhou et al [5] proposed combining threshold secret sharing and identitybased encryption to construct a certificate authority domain that minimizes the length of the verification path and improves the authentication efficiency. Aiming at the large computational cost of the bilinear pairing operation in the elliptic curve and the certificate management in the PKI, Wang et al [6] designed a efficient and secure authenticated key agreement protocol based on the identity-based public key cryptography algorithm and the GDH difficulty problem on the elliptic curve addition group.…”
Section: Related Workmentioning
confidence: 99%
“…However, most of the traditional schemes are PKI-based and IBC-based. Zhou et al [5] proposed combining threshold secret sharing and identitybased encryption to construct a certificate authority domain that minimizes the length of the verification path and improves the authentication efficiency. Aiming at the large computational cost of the bilinear pairing operation in the elliptic curve and the certificate management in the PKI, Wang et al [6] designed a efficient and secure authenticated key agreement protocol based on the identity-based public key cryptography algorithm and the GDH difficulty problem on the elliptic curve addition group.…”
Section: Related Workmentioning
confidence: 99%
“…More recently, Wei et al [20] applied blockchain certificate authority (BCCA) in each domain as nodes in consortium blockchain to realize crossdomain authentication. Zhou et al [21] proposed an authentication scheme employing identity-based encryption and secret sharing, suitable for deployment on public channels within virtual enterprises. In the Industrial Internet of Things (IIoT), Cui et al [22] introduced an anonymous cross-domain authentication scheme, which improves authentication efficiency while meeting traceability, scalability, forward privacy, and identity anonymity requirements.…”
Section: Introductionmentioning
confidence: 99%
“…However, electronic seal lack the convenient technical implementation in electronic contracts. In addition, it require Certificate Authority (CA) [11,12] certificates to ensure the security of mobile IoT terminals, but CA certificates are expensive. Therefore, how to ensure the electronic seal security of mobile IoT enterprise terminals without CA has become the focus.…”
Section: Introductionmentioning
confidence: 99%