{"id":"https://openalex.org/W4417201825","doi":"https://doi.org/10.1109/tnsm.2025.3642315","title":"S <sup>3</sup> Cross: Blockchain-Based Cross-Domain Authentication With Self-Sovereign and Supervised Identity Management","display_name":"S <sup>3</sup> Cross: Blockchain-Based Cross-Domain Authentication With Self-Sovereign and Supervised Identity Management","publication_year":2025,"publication_date":"2025-12-10","ids":{"openalex":"https://openalex.org/W4417201825","doi":"https://doi.org/10.1109/tnsm.2025.3642315"},"language":null,"primary_location":{"id":"doi:10.1109/tnsm.2025.3642315","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3642315","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100449502","display_name":"Chang Chen","orcid":"https://orcid.org/0000-0003-4165-3545"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chang Chen","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101633478","display_name":"Guoyu Yang","orcid":"https://orcid.org/0000-0002-9777-6790"},"institutions":[{"id":"https://openalex.org/I66883779","display_name":"Weifang University","ror":"https://ror.org/01frp7483","country_code":"CN","type":"education","lineage":["https://openalex.org/I66883779"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guoyu Yang","raw_affiliation_strings":["School of Computer Engineering, Weifang University, Weifang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Engineering, Weifang University, Weifang, China","institution_ids":["https://openalex.org/I66883779"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072653266","display_name":"Dawei Zhang","orcid":"https://orcid.org/0000-0001-5942-8245"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dawei Zhang","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100777576","display_name":"Wei Wang","orcid":"https://orcid.org/0000-0002-5974-1589"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100340130","display_name":"Qi Chen","orcid":"https://orcid.org/0000-0001-7386-8706"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Chen","raw_affiliation_strings":["Guangdong Provincial Key Laboratory of Blockchain Security, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Provincial Key Laboratory of Blockchain Security, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100364819","display_name":"Jin Li","orcid":"https://orcid.org/0000-0003-0385-8793"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jin Li","raw_affiliation_strings":["Guangdong Provincial Key Laboratory of Blockchain Security, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Provincial Key Laboratory of Blockchain Security, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100449502"],"corresponding_institution_ids":["https://openalex.org/I21193070"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.43495918,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":null,"first_page":"1217","last_page":"1231"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.35190001130104065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.35190001130104065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.2223999947309494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.09700000286102295,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.6680999994277954},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6363999843597412},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.579800009727478},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.552299976348877},{"id":"https://openalex.org/keywords/traceability","display_name":"Traceability","score":0.5220999717712402},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4472000002861023},{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.4447000026702881},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.4171999990940094},{"id":"https://openalex.org/keywords/pseudonym","display_name":"Pseudonym","score":0.39800000190734863},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.39570000767707825}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8357999920845032},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7357000112533569},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.6680999994277954},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6363999843597412},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.579800009727478},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.552299976348877},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.5220999717712402},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4472000002861023},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.4447000026702881},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.4171999990940094},{"id":"https://openalex.org/C2776021475","wikidata":"https://www.wikidata.org/wiki/Q61002","display_name":"Pseudonym","level":2,"score":0.39800000190734863},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.39570000767707825},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.3817000091075897},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3813999891281128},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.37869998812675476},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.3716000020503998},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.3601999878883362},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.35370001196861267},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.3296999931335449},{"id":"https://openalex.org/C154800190","wikidata":"https://www.wikidata.org/wiki/Q16941470","display_name":"Trust anchor","level":4,"score":0.32899999618530273},{"id":"https://openalex.org/C2777505653","wikidata":"https://www.wikidata.org/wiki/Q4470796","display_name":"Sybil attack","level":3,"score":0.31299999356269836},{"id":"https://openalex.org/C148408913","wikidata":"https://www.wikidata.org/wiki/Q5611269","display_name":"Group signature","level":4,"score":0.31209999322891235},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.30809998512268066},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.30489999055862427},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.304500013589859},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.29910001158714294},{"id":"https://openalex.org/C131672422","wikidata":"https://www.wikidata.org/wiki/Q852594","display_name":"Provable security","level":3,"score":0.2881999909877777},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.2872999906539917},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.2858000099658966},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2842000126838684},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.2799000144004822},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.27950000762939453},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.27230000495910645},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.2599000036716461},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.25}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2025.3642315","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3642315","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1611730642","display_name":null,"funder_award_id":"23A20307","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1858642095","display_name":null,"funder_award_id":"U23A20304","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G192854716","display_name":null,"funder_award_id":"62472115","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2215088380","display_name":null,"funder_award_id":"U23A20307","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3550020321","display_name":null,"funder_award_id":"U21A20463","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5894582779","display_name":null,"funder_award_id":"62132018","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7465859601","display_name":null,"funder_award_id":"U22B2027","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8705631324","display_name":null,"funder_award_id":"2024YFE0111800","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W1807703735","https://openalex.org/W1969035815","https://openalex.org/W2026892462","https://openalex.org/W2030112111","https://openalex.org/W2098104887","https://openalex.org/W2152924492","https://openalex.org/W2172174332","https://openalex.org/W2688317400","https://openalex.org/W2790400697","https://openalex.org/W2903982230","https://openalex.org/W2964159515","https://openalex.org/W3010858269","https://openalex.org/W3085678338","https://openalex.org/W3099589125","https://openalex.org/W3135398899","https://openalex.org/W3136725518","https://openalex.org/W3174304286","https://openalex.org/W3197312228","https://openalex.org/W4210421291","https://openalex.org/W4249468056","https://openalex.org/W4281389235","https://openalex.org/W4288071554","https://openalex.org/W4295935146","https://openalex.org/W4298051233","https://openalex.org/W4312304622","https://openalex.org/W4312328866","https://openalex.org/W4319594769","https://openalex.org/W4365935520","https://openalex.org/W4366977512","https://openalex.org/W4375929041","https://openalex.org/W4381198914","https://openalex.org/W4383503989","https://openalex.org/W4389279206","https://openalex.org/W4390401766","https://openalex.org/W4390774716","https://openalex.org/W4391468035","https://openalex.org/W4391722255","https://openalex.org/W4393034349","https://openalex.org/W4400489127","https://openalex.org/W4402570080","https://openalex.org/W4408280532","https://openalex.org/W4408402784","https://openalex.org/W4408711683","https://openalex.org/W4408941231","https://openalex.org/W4409155977"],"related_works":[],"abstract_inverted_index":{"The":[0,89,170],"widespread":[1],"deployment":[2],"of":[3,5,20,38,58,120,137,154],"Internet":[4],"Things":[6],"(IoT)":[7],"devices":[8,103,116],"has":[9,117],"driven":[10],"their":[11,121],"segmentation":[12],"into":[13],"distinct":[14],"trust":[15],"domains":[16],"for":[17,26,67,162],"the":[18,133],"purpose":[19],"governance,":[21],"creating":[22],"a":[23,77,96,112],"critical":[24],"need":[25],"secure":[27],"cross-domain":[28],"authentication":[29,82],"(CDA).":[30],"CDA":[31],"must":[32],"preserve":[33],"both":[34],"anonymity":[35],"and":[36,60,69,79,106,129,149,158,167,182],"traceability":[37],"device":[39],"identities":[40],"to":[41,55,85,104],"enable":[42],"trustworthy":[43],"data":[44],"exchange.":[45],"However,":[46],"existing":[47],"approaches,":[48,144],"while":[49],"exploring":[50],"this":[51,73],"trade-off,":[52],"remain":[53],"vulnerable":[54],"single":[56],"points":[57],"failure":[59],"Sybil":[61,127],"attacks\u2014threats":[62],"that":[63,101,173],"are":[64],"especially":[65],"severe":[66],"unattended":[68],"resource-constrained":[70],"devices.":[71],"In":[72],"paper,":[74],"we":[75,93],"propose":[76],"Self-Sovereign":[78],"Supervised":[80],"Cross-domain":[81],"scheme":[83,99,175],"(SCross)":[84],"tackle":[86],"these":[87],"issues.":[88],"main":[90],"building":[91],"block":[92],"designed":[94],"is":[95],"pseudonym":[97],"management":[98],"(PMS)":[100],"allows":[102],"generate":[105],"use":[107],"pseudonyms":[108],"without":[109],"relying":[110],"on":[111],"trusted":[113],"party.":[114],"Although":[115],"full":[118],"control":[119],"identities,":[122],"PMS":[123],"still":[124],"ensures":[125],"traceability,":[126],"resistance,":[128],"revocability.":[130],"We":[131,165],"define":[132],"formal":[134],"security":[135,160,181],"models":[136],"PMS,":[138],"instantiate":[139],"it":[140],"under":[141],"two":[142],"different":[143],"namely":[145],"group":[146],"signature":[147],"(SCross-GS)":[148],"zero-knowledge":[150],"succinct":[151],"non-interactive":[152],"arguments":[153],"knowledge":[155],"(zkSNARKs,":[156],"SCross-ZK),":[157],"present":[159],"proofs":[161],"our":[163,174],"proposal.":[164],"implemented":[166],"evaluated":[168],"SCross.":[169],"result":[171],"shows":[172],"achieves":[176],"an":[177],"effective":[178],"trade-off":[179],"between":[180],"efficiency.":[183]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-12-10T00:00:00"}
