{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:49:16Z","timestamp":1742914156451,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031411809"},{"type":"electronic","value":"9783031411816"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-41181-6_19","type":"book-chapter","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T19:02:38Z","timestamp":1696359758000},"page":"336-354","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["WiP: Towards Zero Trust Authentication in\u00a0Critical Industrial Infrastructures with\u00a0PRISM"],"prefix":"10.1007","author":[{"given":"Fuyi","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yanping","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Leo Yu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yuval","family":"Hertzog","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Loewy","sequence":"additional","affiliation":[]},{"given":"Dominique","family":"Valladolid","sequence":"additional","affiliation":[]},{"given":"Julio","family":"Medeiros","sequence":"additional","affiliation":[]},{"given":"Muna","family":"Al-Hawawreh","sequence":"additional","affiliation":[]},{"given":"Robin","family":"Doss","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,4]]},"reference":[{"key":"19_CR1","volume-title":"Zero Trust Networks","author":"E Gilman","year":"2017","unstructured":"Gilman, E., Barth, D.: Zero Trust Networks. O\u2019Reilly Media, Sebastopol (2017)"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Ali, B., Hijjawi, S., Campbell, L.H., Gregory, M.A., Li, S.: A maturity framework for zero-trust security in multiaccess edge computing. Secur. Commun. Netw. 2022 (2022)","DOI":"10.1155\/2022\/3178760"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"He, Y., Huang, D., Chen, L., Ni, Y., Ma, X.: A survey on zero trust architecture: challenges and future trends. Wirel. Commun. Mob. Comput. 2022 (2022)","DOI":"10.1155\/2022\/6476274"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-319-61204-1_3","volume-title":"Applied Cryptography and Network Security","author":"S Jarecki","year":"2017","unstructured":"Jarecki, S., Kiayias, A., Krawczyk, H., Xu, J.: TOPPSS: cost-minimal password-protected secret sharing based on threshold OPRF. In: Gollmann, D., Miyaji, A., Kikuchi, H. (eds.) ACNS 2017. LNCS, vol. 10355, pp. 39\u201358. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-61204-1_3"},{"key":"19_CR5","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1109\/TC.2022.3157996","volume":"72","author":"Y Liu","year":"2022","unstructured":"Liu, Y., et al.: A blockchain-based decentralized, fair and authenticated information sharing scheme in zero trust internet-of-things. IEEE Trans. Comput. 72, 501\u2013512 (2022)","journal-title":"IEEE Trans. Comput."},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Mehraj, S., Banday, M.T.: Establishing a zero trust strategy in cloud computing environment. In 2020 International Conference on Computer Communication and Informatics (ICCCI), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/ICCCI48352.2020.9104214"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Tang, F., Ma, C., Cheng, K.: Privacy-preserving authentication scheme based on zero trust architecture. Digital Commun. Netw. (2023)","DOI":"10.1016\/j.dcan.2023.01.021"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Sonnino, A., Al-Bassam, M., Bano, S., Meiklejohn, S., Danezis, G.: Coconut: threshold issuance selective disclosure credentials with applications to distributed ledgers. arXiv preprint arXiv:1802.07344 (2018)","DOI":"10.14722\/ndss.2019.23272"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Xiaojian, Z., Liandong, C., Jie, F., Xiangqun, W., Qi, W.: Power IoT security protection architecture based on zero trust framework. In: 2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP), pp. 166\u2013170. IEEE (2021)","DOI":"10.1109\/CSP51677.2021.9357607"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Li, S., Iqbal, M., Saxena, N.: Future industry internet of things with zero-trust security. Inf. Syst. Front. pp. 1\u201314 (2022)","DOI":"10.1007\/s10796-021-10199-5"},{"issue":"1","key":"19_CR11","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1080\/10919392.2020.1831870","volume":"31","author":"S Dhar","year":"2021","unstructured":"Dhar, S., Bose, I.: Securing Iot devices using zero trust and blockchain. J. Organ. Comput. Electron. Commer. 31(1), 18\u201334 (2021)","journal-title":"J. Organ. Comput. Electron. Commer."},{"key":"19_CR12","doi-asserted-by":"publisher","first-page":"109068","DOI":"10.1016\/j.comnet.2022.109068","volume":"212","author":"P Garc\u00eda-Teodoro","year":"2022","unstructured":"Garc\u00eda-Teodoro, P., Camacho, J., Maci\u00e1-Fern\u00e1ndez, G., G\u00f3mez-Hern\u00e1ndez, J.A., L\u00f3pez-Mar\u00edn, V.J.: A novel zero-trust network access control scheme based on the security profile of devices and users. Comput. Netw. 212, 109068 (2022)","journal-title":"Comput. Netw."},{"key":"19_CR13","unstructured":"DHS. Zero trust architecture guide, published by the U.S. department of homeland security in 2018. https:\/\/www.cisa.gov\/news-events\/news\/cisa-releases-cloud-security-technical-reference-architecture-and-zero-trust. Accessed 18 Feb 2023"},{"key":"19_CR14","unstructured":"Cisco. Zero trust secure access. https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/zero-trust.html. Accessed 18 Feb 2023"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Hao, F., van Oorschot, P.C.: SoK: password-authenticated key exchange-theory, practice, standardization and real-world lessons. In Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, pp. 697\u2013711 (2022)","DOI":"10.1145\/3488932.3523256"},{"issue":"11","key":"19_CR16","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770\u2013772 (1981)","journal-title":"Commun. ACM"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Security proofs for an efficient password-based key exchange. In Proceedings of the 10th ACM conference on Computer and Communications Security, pp. 241\u2013250 (2003)","DOI":"10.1145\/948109.948142"},{"key":"19_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1007\/3-540-39200-9_33","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2003","author":"R Gennaro","year":"2003","unstructured":"Gennaro, R., Lindell, Y.: A framework for password-based authenticated key exchange. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 524\u2013543. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-39200-9_33"},{"key":"19_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1007\/978-3-319-78372-7_15","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2018","author":"S Jarecki","year":"2018","unstructured":"Jarecki, S., Krawczyk, H., Xu, J.: OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10822, pp. 456\u2013486. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78372-7_15"},{"key":"19_CR20","doi-asserted-by":"publisher","first-page":"3133","DOI":"10.1007\/s12652-018-1029-3","volume":"10","author":"C-M Chen","year":"2019","unstructured":"Chen, C.-M., Wang, K.-H., Yeh, K.-H., Xiang, B., Tsu-Yang, W.: Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications. J. Ambient Intell. Humanized Comput. 10, 3133\u20133142 (2019)","journal-title":"J. Ambient Intell. Humanized Comput."},{"key":"19_CR21","volume-title":"Towards Secure Computation with Optimal Complexity","author":"P Miao","year":"2019","unstructured":"Miao, P.: Towards Secure Computation with Optimal Complexity. University of California, Berkeley (2019)"},{"issue":"11","key":"19_CR22","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"19_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-540-30576-7_17","volume-title":"Theory of Cryptography","author":"MJ Freedman","year":"2005","unstructured":"Freedman, M.J., Ishai, Y., Pinkas, B., Reingold, O.: Keyword search and oblivious pseudorandom functions. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 303\u2013324. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-540-30576-7_17"},{"key":"19_CR24","first-page":"1290","volume":"2021","author":"A Erwig","year":"2021","unstructured":"Erwig, A., Faust, S., Riahi, S.: Large-scale non-interactive threshold cryptosystems through anonymity. IACR Cryptol. ePrint Arch. 2021, 1290 (2021)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Agrawal, S., Miao, P., Mohassel, P., Mukherjee, P.: PASTA: password-based threshold authentication. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 2042\u20132059 (2018)","DOI":"10.1145\/3243734.3243839"},{"key":"19_CR26","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s00145-006-0347-3","volume":"20","author":"R Gennaro","year":"2007","unstructured":"Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems. J. Cryptology 20, 51\u201383 (2007)","journal-title":"J. Cryptology"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-41181-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T19:05:09Z","timestamp":1696359909000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-41181-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031411809","9783031411816"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-41181-6_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"4 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kyoto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sulab-sever.u-aizu.ac.jp\/ACNS2023\/committees.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"263","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.9","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"For the workshops 34 full papers have been accepted from a total of 73 submissions; 13 poster papers are also included.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}