全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

Discussion on “Zero-Trust” or “Evidence-Only” Architecture

DOI: 10.4236/oalib.1109099, PP. 1-11

Subject Areas: Information and Communication: Security, Privacy, and Trust

Keywords: PKI, CPK, Authentication, Trust, Evidence, Logic, Cyber

Full-Text   Cite this paper   Add to My Lib

Abstract

Recently, the U.S. Federal government and the Department of Defense announced the “Zero Trust” reigniting the debate on the logic of trust. Subject authentication is the core technology of cyber security. The traditional system is based on the reasoning logic of trust. The trust logic is the product of the situation that the authenticity of the subject cannot be proved, and the authenticity of the subject is remedied by a third party’s certificates. However, the authenticity of certificates still cannot be proved, and can’t be used as evidence after the fact, so a complete signature protocol cannot be constructed. Trust provides a basis for face to face transaction, but not as evidence afterwards. Trust-based reasoning logic adopts a decentralized key generation system, and the decentralized system has too strong exclusivity, which is easy to be used by criminal groups. Therefore, there is a new requirement to construct new authentication logic, which is “Evidence Only Architecture”. The evidence based authentication logic proves the authenticity of the subject through the one-to-one mapping between the identifier and the key. However, we have to admit that it is difficult to establish such a mapping. As long as the mapping is established, the real digital signature can be constituted and can be used as evidence after the fact.

Cite this paper

Nan, X. (2022). Discussion on “Zero-Trust” or “Evidence-Only” Architecture. Open Access Library Journal, 9, e9099. doi: http://dx.doi.org/10.4236/oalib.1109099.

References

[1]  Department of Defense (2021) Zero Trust Reference Architecture, Version 1.0.
[2]  President’s Information Technology Advisory Committee (2005) Cyber Security: A Crisis of Prioritization.
[3]  CRS Report for Congress (2004) Clay Wilson, Information Warfare and Cyber War: Capabilities and Related Policy Issues.
[4]  Nan, X.H. (2006) CPK on Identifier Authentication. Publishing House of Defense Industry, Beijing.
[5]  National Institute of Standards and Technology, INST PUB 186, Digital Signature Standards, U.S. Department of Commerce 1994.
[6]  Nan, X.H. (2020) GAP One-Step Protocol, Communication Technology. Communication Technology, 53, 3030-3033.

Full-Text


comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413