Xingyu Liang , Sen Wang , Ling Xiong , Zhicai Liu , Neal N. Xiong
{"title":"SAGTM: A secure authentication scheme with traceability for avatars in the Metaverse","authors":"Xingyu Liang , Sen Wang , Ling Xiong , Zhicai Liu , Neal N. Xiong","doi":"10.1016/j.comnet.2025.111206","DOIUrl":null,"url":null,"abstract":"<div><div>The Metaverse, by integrating virtual and physical worlds, offers a digital platform that transcends the limitations of time and space, enabling users to engage in entertainment, work, and social interactions. However, these applications also introduce privacy risks, making robust identity authentication systems crucial. Traditional security measures are inefficient and inadequate for the unique requirements of Metaverse environments. The anonymous credential scheme, as a method of anonymous authentication, can effectively prevent attackers from accessing avatar information while ensuring that the accessing server cannot identify the avatar, thereby protecting avatar privacy. Moreover, it facilitates the tracking and management of malicious avatar behavior. Towards this advanced goal, this work proposes a blockchain-based supervised authentication scheme using anonymous credentials. Firstly, non-interactive zero-knowledge proofs are integrated into anonymous credentials technology to achieve avatar anonmity and unlinkability. Secondly, the distributed ElGamal encryption algorithm is used to enable traceability for locating malicious users. Finally, to verify the avatar’s access permission, the proposed scheme combines an accumulator into blockchain technology, enabling the access server to verify the level of access while maintaining anonymity and unlinkability. Security analysis demonstrates that our scheme possesses advantages such as traceability, unlinkability, anonymity, and forgery resistance. Experimental results indicate that the proposed scheme outperforms other anonymous authentication schemes in terms of performance overhead. Therefore, our scheme is more efficient and practical compared to other anonymous schemes.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"263 ","pages":"Article 111206"},"PeriodicalIF":4.4000,"publicationDate":"2025-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625001744","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
The Metaverse, by integrating virtual and physical worlds, offers a digital platform that transcends the limitations of time and space, enabling users to engage in entertainment, work, and social interactions. However, these applications also introduce privacy risks, making robust identity authentication systems crucial. Traditional security measures are inefficient and inadequate for the unique requirements of Metaverse environments. The anonymous credential scheme, as a method of anonymous authentication, can effectively prevent attackers from accessing avatar information while ensuring that the accessing server cannot identify the avatar, thereby protecting avatar privacy. Moreover, it facilitates the tracking and management of malicious avatar behavior. Towards this advanced goal, this work proposes a blockchain-based supervised authentication scheme using anonymous credentials. Firstly, non-interactive zero-knowledge proofs are integrated into anonymous credentials technology to achieve avatar anonmity and unlinkability. Secondly, the distributed ElGamal encryption algorithm is used to enable traceability for locating malicious users. Finally, to verify the avatar’s access permission, the proposed scheme combines an accumulator into blockchain technology, enabling the access server to verify the level of access while maintaining anonymity and unlinkability. Security analysis demonstrates that our scheme possesses advantages such as traceability, unlinkability, anonymity, and forgery resistance. Experimental results indicate that the proposed scheme outperforms other anonymous authentication schemes in terms of performance overhead. Therefore, our scheme is more efficient and practical compared to other anonymous schemes.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.