2019
DOI: 10.1016/j.future.2019.01.026
|View full text |Cite
|
Sign up to set email alerts
|

PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
45
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 89 publications
(45 citation statements)
references
References 36 publications
0
45
0
Order By: Relevance
“…The Merkle tree's hash value is stored in the block header together with a timestamp and the hash of the previous block. Therefore, if an attacker wants to tamper with a record in the blockchain, he/she needs not only to modify the hash of the block, but also to modify the hash of all subsequent blocks which are nearly impossible to achieve [65]. Note that, with the guarantee of immutability and ABE scheme,…”
Section: Discussionmentioning
confidence: 99%
“…The Merkle tree's hash value is stored in the block header together with a timestamp and the hash of the previous block. Therefore, if an attacker wants to tamper with a record in the blockchain, he/she needs not only to modify the hash of the block, but also to modify the hash of all subsequent blocks which are nearly impossible to achieve [65]. Note that, with the guarantee of immutability and ABE scheme,…”
Section: Discussionmentioning
confidence: 99%
“…Jiang et al [79] proposed a thin-client Authentication scheme, named PTAS, for IoT application. The PTAS scheme is applied in blockchain-based public key infrastructure (PKI).…”
Section: A Blockchain-based Solutions 1) Blockchain-based Pki Solutionmentioning
confidence: 99%
“…Inside the SDN domain the P2P relation between the IoT devices can be observed [30]. Authors proposed a blockchain based thin client authentication scheme for IoT network which use public key infrastructure (PKI) to secure communication between IoT devices which identify each ID for each device to avoid the problem of single point of failure [31].…”
Section: Literature Reviewmentioning
confidence: 99%