{"id":"https://openalex.org/W4411688915","doi":"https://doi.org/10.1109/eucnc/6gsummit63408.2025.11036866","title":"A Zero-Knowledge-Based Approach for Secure Inter-Slice Communication in 6G Networks","display_name":"A Zero-Knowledge-Based Approach for Secure Inter-Slice Communication in 6G Networks","publication_year":2025,"publication_date":"2025-06-03","ids":{"openalex":"https://openalex.org/W4411688915","doi":"https://doi.org/10.1109/eucnc/6gsummit63408.2025.11036866"},"language":"en","primary_location":{"id":"doi:10.1109/eucnc/6gsummit63408.2025.11036866","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eucnc/6gsummit63408.2025.11036866","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Joint European Conference on Networks and Communications &amp;amp; 6G Summit (EuCNC/6G Summit)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011767728","display_name":"Alfonso Egio","orcid":"https://orcid.org/0009-0006-3755-0139"},"institutions":[{"id":"https://openalex.org/I4210130845","display_name":"i2CAT","ror":"https://ror.org/02rkks755","country_code":"ES","type":"nonprofit","lineage":["https://openalex.org/I4210130845","https://openalex.org/I4387153040"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Alfonso Egio","raw_affiliation_strings":["i2CAT Foundation,Cybersecurity Department,Barcelona,Spain"],"affiliations":[{"raw_affiliation_string":"i2CAT Foundation,Cybersecurity Department,Barcelona,Spain","institution_ids":["https://openalex.org/I4210130845"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5118648805","display_name":"\u00c1lvaro Le Monnier","orcid":null},"institutions":[{"id":"https://openalex.org/I4210130845","display_name":"i2CAT","ror":"https://ror.org/02rkks755","country_code":"ES","type":"nonprofit","lineage":["https://openalex.org/I4210130845","https://openalex.org/I4387153040"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"\u00c1lvaro Le Monnier","raw_affiliation_strings":["i2CAT Foundation,Cybersecurity Department,Barcelona,Spain"],"affiliations":[{"raw_affiliation_string":"i2CAT Foundation,Cybersecurity Department,Barcelona,Spain","institution_ids":["https://openalex.org/I4210130845"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018538772","display_name":"Muhammad Asad","orcid":"https://orcid.org/0000-0003-0036-1714"},"institutions":[{"id":"https://openalex.org/I4210130845","display_name":"i2CAT","ror":"https://ror.org/02rkks755","country_code":"ES","type":"nonprofit","lineage":["https://openalex.org/I4210130845","https://openalex.org/I4387153040"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Muhammad Asad","raw_affiliation_strings":["i2CAT Foundation,Cybersecurity Department,Barcelona,Spain"],"affiliations":[{"raw_affiliation_string":"i2CAT Foundation,Cybersecurity Department,Barcelona,Spain","institution_ids":["https://openalex.org/I4210130845"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030263872","display_name":"Maxime Compasti\u00e9","orcid":"https://orcid.org/0000-0001-7399-709X"},"institutions":[{"id":"https://openalex.org/I4210130845","display_name":"i2CAT","ror":"https://ror.org/02rkks755","country_code":"ES","type":"nonprofit","lineage":["https://openalex.org/I4210130845","https://openalex.org/I4387153040"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Maxime Compasti\u00e9","raw_affiliation_strings":["i2CAT Foundation,Cybersecurity Department,Barcelona,Spain"],"affiliations":[{"raw_affiliation_string":"i2CAT Foundation,Cybersecurity Department,Barcelona,Spain","institution_ids":["https://openalex.org/I4210130845"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026307340","display_name":"Muhammad Shuaib Siddiqui","orcid":"https://orcid.org/0000-0002-8257-4969"},"institutions":[{"id":"https://openalex.org/I4210130845","display_name":"i2CAT","ror":"https://ror.org/02rkks755","country_code":"ES","type":"nonprofit","lineage":["https://openalex.org/I4210130845","https://openalex.org/I4387153040"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Muhammad Shuaib Siddiqui","raw_affiliation_strings":["i2CAT Foundation,Cybersecurity Department,Barcelona,Spain"],"affiliations":[{"raw_affiliation_string":"i2CAT Foundation,Cybersecurity Department,Barcelona,Spain","institution_ids":["https://openalex.org/I4210130845"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5011767728"],"corresponding_institution_ids":["https://openalex.org/I4210130845"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1621312,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"763","last_page":"768"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.700204610824585},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6601685285568237},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.49256616830825806},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.461936354637146},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.19550690054893494},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1512070596218109}],"concepts":[{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.700204610824585},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6601685285568237},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.49256616830825806},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.461936354637146},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.19550690054893494},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1512070596218109},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/eucnc/6gsummit63408.2025.11036866","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eucnc/6gsummit63408.2025.11036866","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Joint European Conference on Networks and Communications &amp;amp; 6G Summit (EuCNC/6G Summit)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2005725110","https://openalex.org/W2276006845","https://openalex.org/W2496543269","https://openalex.org/W2589054249","https://openalex.org/W2990843357","https://openalex.org/W3023752352","https://openalex.org/W3089741453","https://openalex.org/W3115730995","https://openalex.org/W3163231210","https://openalex.org/W4205380485","https://openalex.org/W4285257592","https://openalex.org/W4385627158","https://openalex.org/W4386473332","https://openalex.org/W4388662174","https://openalex.org/W4390546493","https://openalex.org/W4401359303","https://openalex.org/W4401990402","https://openalex.org/W4409253440","https://openalex.org/W4411232281","https://openalex.org/W6636112223","https://openalex.org/W6749720243"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W1870614684","https://openalex.org/W194387157","https://openalex.org/W2000850689","https://openalex.org/W59628553","https://openalex.org/W1483984920","https://openalex.org/W4406460655","https://openalex.org/W2952570804"],"abstract_inverted_index":{"As":[0],"the":[1,5,15,42,54,71,79,187,193],"sixth":[2],"generation":[3],"of":[4,44,53,81,192],"cellular":[6],"network":[7,38,46,87,107],"is":[8,51,90,154],"set":[9],"to":[10,32,57,93,100,118,177],"be":[11,160],"deployed":[12],"around":[13],"2030,":[14],"needs":[16],"for":[17,26,70,85,128,137,145],"ubiquitous":[18],"connectivity":[19],"and":[20,36,98,140,167,201],"increased":[21],"resource":[22,190],"demand":[23],"will":[24],"press":[25],"further":[27],"collaboration":[28,103],"between":[29],"different":[30],"stakeholders":[31],"constitute":[33],"an":[34,164],"efficient":[35],"resilient":[37],"fabric.":[39],"In":[40,116],"practice,":[41],"deployment":[43],"multiple":[45,49],"slices":[47],"in":[48,170,198],"domains":[50],"one":[52,84],"promising":[55],"approaches":[56],"reach":[58],"this":[59,66,119,121],"vision.":[60],"However,":[61],"from":[62],"a":[63,74,82,105,124,157],"privacy":[64],"standpoint,":[65],"introduces":[67],"additional":[68],"risks":[69],"customers,":[72],"as":[73],"malicious":[75],"slice":[76,96,158],"may":[77],"contemplate":[78],"impersonation":[80],"legit":[83],"exfiltrating":[86],"traffic.":[88],"It":[89],"therefore":[91],"necessary":[92],"proceed":[94],"with":[95,104],"identification":[97],"authentication":[99,126,139,194],"prevent":[101],"any":[102],"non-legit":[106],"domain":[108],"while":[109],"avoiding":[110],"exchanging":[111],"sensitive":[112,152],"data":[113],"before":[114,156],"authentication.":[115],"response":[117],"challenge,":[120],"paper":[122],"presents":[123],"privacy-preserving":[125,138],"framework":[127,132],"inter-slice":[129],"communication.":[130],"The":[131],"integrates":[133],"Zero-Knowledge":[134],"Proofs":[135],"(ZKPs)":[136],"Public":[141],"Key":[142],"Cryptography":[143],"(PKC)":[144],"secure":[146],"identity":[147],"management,":[148],"ensuring":[149],"that":[150],"no":[151],"information":[153],"jeopardized":[155],"can":[159],"trusted.":[161],"We":[162],"expose":[163],"implementation":[165],"prototype":[166],"evaluate":[168],"it":[169],"controlled":[171],"slicing":[172],"environment,":[173],"demonstrating":[174],"its":[175,196],"ability":[176],"maintain":[178],"performance":[179],"under":[180],"varying":[181],"operational":[182],"constraints.":[183],"Quantitative":[184],"results":[185],"highlight":[186],"efficiency":[188],"limited":[189],"consumption":[191],"model,":[195],"scalability":[197],"distributed":[199],"environments,":[200],"robustness":[202],"against":[203],"security":[204],"threats.":[205]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
