Heterogeneous Cross-Domain Identity Authentication Scheme Based on Proxy Resignature in Cloud Environment

Based on proxy resignature, the signature transformation between trust domains of different cryptographic systems is realized with the help of the cloud authentication center, so as to achieve cross-domain access between users and cloud service providers in heterogeneous environment. Hierarchical ID tree realizes the uniqueness of identity in communication, and the security of heterogeneous cross-domain identity authentication is enhanced by the two-factor authentication of “password + key” and temporary identity replacing real identity. The security of the scheme is proved under the CK model, which can anonymously trace entity identity, resist replay attacks, replacement attacks, and man-in-the-middle attacks, and the simulation experiment is carried out. By searching it in related fields, no paper on heterogeneous cross-domain identity authentication based on proxy resignature has been published yet. The results of this paper show that the proposed scheme has better computing performance and higher security.

[1]  Lei Zhang,et al.  Security Enhanced Anonymous Remote User Authentication and Key Agreement for Cloud Computing , 2014, 2014 IEEE 17th International Conference on Computational Science and Engineering.

[2]  Rolf Moulton,et al.  Protecting ownership of proprietary information , 1989, Comput. Secur..

[3]  Kazuhiro Kuwabara,et al.  Multi-domain Public Key Infrastructure for Information Security with Use of a Multi-Agent System , 2013, ACIIDS.

[4]  Yuguang Fang,et al.  CAKA: a novel certificateless-based cross-domain authenticated key agreement protocol for wireless mesh networks , 2016, Wirel. Networks.

[5]  Mohamed Amine Ferrag,et al.  Authentication Protocols for Internet of Things: A Comprehensive Survey , 2016, Secur. Commun. Networks.

[6]  Chao Yuan,et al.  EIMAKP: Heterogeneous Cross-Domain Authenticated Key Agreement Protocols in the EIM System , 2017, Arabian Journal for Science and Engineering.

[7]  Sherali Zeadally,et al.  Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.

[8]  Sen-Shan Huang,et al.  Efficient Strongly Unforgeable ID-Based Signature Without Random Oracles , 2014, Informatica.

[9]  Yan Zhao,et al.  IRBA: An Identity-Based Cross-Domain Authentication Scheme for the Internet of Things , 2020 .

[10]  Miaomiao Tian,et al.  Identity-based proxy re-signatures from lattices , 2015, Inf. Process. Lett..

[11]  Wang Ruifang,et al.  A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application , 2018, IEEE Access.

[12]  Li Yang,et al.  Direct Anonymous Attestation Scheme in Cross Trusted Domain for Wireless Mobile Networks: Direct Anonymous Attestation Scheme in Cross Trusted Domain for Wireless Mobile Networks , 2012 .