Yingying Yao, Xiaolin Chang, Lin Li, Jiqiang Liu, J. Misic, V. Mišić
{"title":"Metaverse-AKA:一个轻量级且保护隐私的无缝跨metaverse认证和密钥协议方案","authors":"Yingying Yao, Xiaolin Chang, Lin Li, Jiqiang Liu, J. Misic, V. Mišić","doi":"10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00340","DOIUrl":null,"url":null,"abstract":"The recent advances of emerging technologies including artificial intelligence, 5G, 6G, extended reality and blockchain promote the rapid development of next-generation Internet. As an evolving paradigm of next-generation Internet, metaverse, a fully immersive, hyper spatiotemporal and selfsustaining virtual shared space, is moving from imagination to the coming reality. However, its massive data flow, pervasive user profiling activities and other intrinsic features can lead to a lot of security and privacy concerns, which will hinder its further deployment. Specially, since the identities of users/avatars in the metaverse can be illegally stolen, impersonated, and interoperability issues can be encountered in authentication across metaverses, this paper designs a lightweight and privacy-preserving seamless cross-metaverse authentication and key agreement scheme named MetaverseAKA to meet the challenges. Metaverse-AKA can not only realize the seamless cross-metaverse authentication but also assure the users’ privacy by achieving the anonymity and unlinkability. In addition, Metaverse-AKA also has the following advantages: (i) Realizing the traceability for users in physical world. (ii) Resistance to multiple attacks like impersonation attack, man-in-the-middle attack and replay attack. (iii) Adopting lightweight cryptographic prinitives and having better performance through experiment verification and comparison.","PeriodicalId":0,"journal":{"name":"","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Metaverse-AKA: A Lightweight and PrivacyPreserving Seamless Cross-Metaverse Authentication and Key Agreement Scheme\",\"authors\":\"Yingying Yao, Xiaolin Chang, Lin Li, Jiqiang Liu, J. Misic, V. Mišić\",\"doi\":\"10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00340\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The recent advances of emerging technologies including artificial intelligence, 5G, 6G, extended reality and blockchain promote the rapid development of next-generation Internet. As an evolving paradigm of next-generation Internet, metaverse, a fully immersive, hyper spatiotemporal and selfsustaining virtual shared space, is moving from imagination to the coming reality. However, its massive data flow, pervasive user profiling activities and other intrinsic features can lead to a lot of security and privacy concerns, which will hinder its further deployment. Specially, since the identities of users/avatars in the metaverse can be illegally stolen, impersonated, and interoperability issues can be encountered in authentication across metaverses, this paper designs a lightweight and privacy-preserving seamless cross-metaverse authentication and key agreement scheme named MetaverseAKA to meet the challenges. Metaverse-AKA can not only realize the seamless cross-metaverse authentication but also assure the users’ privacy by achieving the anonymity and unlinkability. In addition, Metaverse-AKA also has the following advantages: (i) Realizing the traceability for users in physical world. (ii) Resistance to multiple attacks like impersonation attack, man-in-the-middle attack and replay attack. (iii) Adopting lightweight cryptographic prinitives and having better performance through experiment verification and comparison.\",\"PeriodicalId\":0,\"journal\":{\"name\":\"\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0,\"publicationDate\":\"2022-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00340\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00340","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Metaverse-AKA: A Lightweight and PrivacyPreserving Seamless Cross-Metaverse Authentication and Key Agreement Scheme
The recent advances of emerging technologies including artificial intelligence, 5G, 6G, extended reality and blockchain promote the rapid development of next-generation Internet. As an evolving paradigm of next-generation Internet, metaverse, a fully immersive, hyper spatiotemporal and selfsustaining virtual shared space, is moving from imagination to the coming reality. However, its massive data flow, pervasive user profiling activities and other intrinsic features can lead to a lot of security and privacy concerns, which will hinder its further deployment. Specially, since the identities of users/avatars in the metaverse can be illegally stolen, impersonated, and interoperability issues can be encountered in authentication across metaverses, this paper designs a lightweight and privacy-preserving seamless cross-metaverse authentication and key agreement scheme named MetaverseAKA to meet the challenges. Metaverse-AKA can not only realize the seamless cross-metaverse authentication but also assure the users’ privacy by achieving the anonymity and unlinkability. In addition, Metaverse-AKA also has the following advantages: (i) Realizing the traceability for users in physical world. (ii) Resistance to multiple attacks like impersonation attack, man-in-the-middle attack and replay attack. (iii) Adopting lightweight cryptographic prinitives and having better performance through experiment verification and comparison.