{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:59:37Z","timestamp":1740142777213,"version":"3.37.3"},"reference-count":28,"publisher":"Oxford University Press (OUP)","issue":"3","license":[{"start":{"date-parts":[[2023,3,21]],"date-time":"2023-03-21T00:00:00Z","timestamp":1679356800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"name":"Wuhan-Shuguang Project","award":["2022010801020283"],"award-info":[{"award-number":["2022010801020283"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62173157","61702212","62172181"],"award-info":[{"award-number":["62173157","61702212","62172181"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Major Project of Scientific and Technological R&D of Hubei Agricultural Scientific and Technological Innovation Center","award":["2020-620-000-002-03"],"award-info":[{"award-number":["2020-620-000-002-03"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,4,14]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>With the development of information networks, the entities from different network domains interact with each other more and more frequently. Therefore, identity management and authentication are essential in cross-domain setting. The traditional Public Key Infrastructure (PKI) architecture has some problems, including single point of failure, inefficient certificate revocation status management and also lack of privacy protection, which cannot meet the demand of cross-domain identity authentication. Blockchain is suitable for multi-participant collaboration in multi-trust domain scenarios. In this paper, a cross-domain certificate management scheme CD-BCM based on the consortium blockchain is proposed. For the issue of Certificate Authority\u2019s single point of failure, we design a multi-signature algorithm. In addition, we propose a unified structure for batch certificates verification and conversion, which improve the efficiency of erroneous certificate identification. Finally, by comparing with current related schemes, our scheme achieves good functionality and scalability in the scenario of cross-domain certificate management.<\/jats:p>","DOI":"10.1093\/comjnl\/bxad025","type":"journal-article","created":{"date-parts":[[2023,3,18]],"date-time":"2023-03-18T15:24:27Z","timestamp":1679153067000},"page":"864-874","source":"Crossref","is-referenced-by-count":0,"title":["CD-BCM:Cross-Domain Batch Certificates Management Based On Blockchain"],"prefix":"10.1093","volume":"67","author":[{"given":"Shixiong","family":"Yao","sequence":"first","affiliation":[{"name":"School of Computer, Central China Normal University , NO.152 Luoyu Road, 430079, Wuhan , China"}]},{"given":"Pei","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer, Central China Normal University , NO.152 Luoyu Road, 430079, Wuhan , China"}]},{"given":"Jing","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University , NO.299, Bayi Road, Wuhan , China"}]},{"given":"Yuexing","family":"Zeng","sequence":"additional","affiliation":[{"name":"School of Computer, Central China Normal University , NO.152 Luoyu Road, 430079, Wuhan , China"}]},{"given":"Jiageng","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer, Central China Normal University , NO.152 Luoyu Road, 430079, Wuhan , China"}]},{"given":"Donghui","family":"Wang","sequence":"additional","affiliation":[{"name":"Huawei , Shenzhen, Guangdong, 518129 , China"}]}],"member":"286","published-online":{"date-parts":[[2023,3,21]]},"reference":[{"key":"2024041716571382400_ref1","article-title":"Public key cryptography for cross-realm authentication in kerberos","author":"Draft-IETF-cat-kerberos-pk-cross-08","year":"2001","journal-title":"Internet Engineering Task Force (IETF)."},{"key":"2024041716571382400_ref2","first-page":"153","article-title":"Walking the web of trust","volume-title":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","author":"Caronni","year":"2000"},{"key":"2024041716571382400_ref3","first-page":"1","article-title":"Trust models and management in public-key infrastructures","volume":"12","author":"Linn","year":"2000","journal-title":"RSA laboratories"},{"key":"2024041716571382400_ref4","doi-asserted-by":"crossref","first-page":"102812","DOI":"10.1016\/j.jnca.2020.102812","article-title":"Master-slave chain based trusted cross-domain authentication mechanism in IoT","volume":"172","author":"Guo","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"2024041716571382400_ref5","doi-asserted-by":"crossref","first-page":"634","DOI":"10.3390\/electronics9040634","article-title":"IRBA: an identity-based cross-domain authentication scheme for the internet of things","volume":"9","author":"Jia","year":"2020","journal-title":"Electronics"},{"key":"2024041716571382400_ref6","doi-asserted-by":"crossref","first-page":"933","DOI":"10.1007\/s12083-021-01071-z","article-title":"Cross-domain trust management mechanism for internet of things systems","volume":"14","author":"Wu","year":"2021","journal-title":"Peer Peer Netw. Appl."},{"key":"2024041716571382400_ref7","first-page":"1","article-title":"A blockchain-based IoT cross-domain delegation access control method","volume":"2021","author":"Li","year":"2021","journal-title":"Secur. Commun. Netw."},{"issue":"12","key":"2024041716571382400_ref8","doi-asserted-by":"crossref","first-page":"22501","DOI":"10.1109\/JIOT.2022.3176192","article-title":"Efficient and privacy-preserving blockchain-based multi-factor device authentication protocol for cross-domain IIoT","volume":"9","author":"Zhang","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"2024041716571382400_ref9","first-page":"1","article-title":"A lightweight authentication scheme based on consortium blockchain for cross-domain IoT","volume":"2022","author":"Zhang","year":"2022","journal-title":"Secur. Commun. Netw."},{"key":"2024041716571382400_ref10","first-page":"1","article-title":"Research on a cross-domain authentication scheme based on consortium blockchain in v2g networks of smart grid","volume-title":"2018 2nd IEEE Conference on Energy Internet and Energy System Integration (EI2)","author":"Liu","year":"2018"},{"key":"2024041716571382400_ref11","first-page":"1","article-title":"Secure data sharing with flexible cross-domain authorization in autonomous vehicle systems","author":"Sun","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"2024041716571382400_ref12","article-title":"Trustroam: a novel blockchain-based cross-domain authentication scheme for wi-fi access","author":"Li","year":"2019","journal-title":"14th International Conference, WASA 2019"},{"key":"2024041716571382400_ref13","first-page":"102538","article-title":"BTCAS: a blockchain-based thoroughly cross-domain authentication scheme","volume":"55","author":"Zhang","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"issue":"1","key":"2024041716571382400_ref14","doi-asserted-by":"crossref","first-page":"44","DOI":"10.23919\/JCIN.2021.9387704","article-title":"Bidm: a blockchain-enabled cross-domain identity management system","volume":"6","author":"Chen","year":"2021","journal-title":"J. Commun. Inf. Netw."},{"key":"2024041716571382400_ref15","doi-asserted-by":"crossref","first-page":"3301","DOI":"10.1109\/TDSC.2021.3092375","article-title":"XAuth: efficient privacy-preserving cross-domain authentication","volume":"19","author":"Chen","year":"2022","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"2024041716571382400_ref16","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/BigCom53800.2021.00007","article-title":"A certificate authority domain-based cross-domain authentication scheme for virtual enterprise using identity based encryption","volume-title":"2021 7th International Conference on Big Data Computing and Communications (BigCom)","author":"Zhou","year":"2021"},{"key":"2024041716571382400_ref17","doi-asserted-by":"crossref","first-page":"6224","DOI":"10.1109\/JIOT.2021.3113321","article-title":"Blockchain-based cross-domain authentication for intelligent 5g-enabled internet of drones","volume":"9","author":"Feng","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"2024041716571382400_ref18","first-page":"803","article-title":"A decentralized public key infrastructure with identity retention","volume":"2014","author":"Fromknecht","year":"2014","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"2024041716571382400_ref19","first-page":"311","article-title":"Pb-pki: A privacy-aware blockchain-based pki","volume-title":"14th International Conference on Security and Cryptography (SECRYPT 2017)","author":"Axon","year":"2017"},{"key":"2024041716571382400_ref20","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/3055518.3055530","article-title":"Scpki: A smart contract-based pki and identity system","volume-title":"Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts","author":"Al-Bassam","year":"2017"},{"key":"2024041716571382400_ref21","first-page":"2060","article-title":"CertChain: Public and efficient certificate audit based on blockchain for TLS connections","volume-title":"IEEE INFOCOM 2018","author":"Chen","year":"2018"},{"key":"2024041716571382400_ref22","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1016\/j.cose.2019.05.013","article-title":"CertLedger: a new PKI model with certificate transparency based on blockchain","volume":"85","author":"Kubilay","year":"2019","journal-title":"Comput. Secur."},{"key":"2024041716571382400_ref23","doi-asserted-by":"crossref","first-page":"6117","DOI":"10.1109\/ACCESS.2018.2889898","article-title":"PBCert: privacy-preserving blockchain-based certificate status validation toward mass storage management","volume":"7","author":"Yao","year":"2019","journal-title":"IEEE Access"},{"key":"2024041716571382400_ref24","first-page":"1","article-title":"Checks and balances: A tripartite public key infrastructure for secure web-based connections","volume-title":"IEEE INFOCOM 2017","author":"Chen","year":"2017"},{"key":"2024041716571382400_ref25","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/SSPS.2017.8071559","article-title":"Mutual authentication for IoT smart environment using certificate-less public key cryptography","volume-title":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","author":"Bala","year":"2017"},{"key":"2024041716571382400_ref26","first-page":"92","article-title":"Collaborative validation of public-key certificates for iot by distributed caching","volume":"29","author":"Wang","year":"2019","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"2024041716571382400_ref27","article-title":"Checking certificate revocation efficiently using certificate revocation guard","volume":"48","author":"Qinwen","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"2024041716571382400_ref28","article-title":"Compact multi-signatures for smaller blockchains","author":"Boneh","year":"2018","journal-title":"24th International Conference on the Theory and Application of Cryptology and Information Security"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/67\/3\/864\/57231607\/bxad025.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/67\/3\/864\/57231607\/bxad025.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T19:59:25Z","timestamp":1713383965000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/67\/3\/864\/7080911"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,21]]},"references-count":28,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2023,3,21]]},"published-print":{"date-parts":[[2024,4,14]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxad025","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2024,3]]},"published":{"date-parts":[[2023,3,21]]}}}