Password-Authenticated Decentralized Identities

نویسندگان

چکیده

Password-authenticated identities, where users establish username-password pairs with individual servers and use them later on for authentication, is the most widespread user authentication method over Internet. Although they are simple, user-friendly, broadly adopted, offer insecure position server operators as trusted parties, giving full control users’ identities. To mitigate these limitations, many identity systems have embraced public-key cryptography concept of decentralization. All systems; however, require to create manage public-private keypairs. Unfortunately, usually do not required knowledge resources properly handle cryptographic secrets, which arguably contributed failures end-user infrastructures (PKIs). In fact, today, no PKI, able authenticate web servers, has a significant adoption rate. this paper, we propose Decentralized Identities (PDIDs), an framework can register their self-sovereign universal credentials. Our system provides global namespace, human-meaningful usernames, resilience against username collision attacks. A user’s be used any without revealing that anything about password, such offline dictionary attacks possible password. We analyze PDIDs implement it using existing tools. report our implementation evaluation.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Password Authenticated Exchange

Extensible Authentication Protocol (EAP) Password Authenticated Exchange Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document defines an Extensible Authentication Protocol (EAP) method called EAP-PAX (Password Authenticated eXchange). This method is a li...

متن کامل

Password-Based Authenticated Key Exchange

Authenticated Key Exchange protocols enable several parties to establish a shared cryptographically strong key over an insecure network using various authentication means, such as strong cryptographic keys or short (i.e., low-entropy) common secrets. The latter example is definitely the most interesting in practice, since no additional device is required, but just a human-memorable password, fo...

متن کامل

Password Authenticated Key Exchange and Protected Password Change Protocols

In this paper, we propose new password authenticated key exchange (PAKE) and protected password change (PPC) protocols without any symmetric or public-key cryptosystems. The security of the proposed protocols is based on the computational Diffie-Hellman assumption in the random oracle model. The proposed scheme can resist both forgery server and denial of service attacks.

متن کامل

Pretty-Simple Password-Authenticated Key-Exchange Protocol

In this paper, we propose pretty simple password-authenticated key-exchange protocol which is based on the difficulty of solving DDH problem. It has the following advantages: (1) Both y1 and y2 in our protocol are independent and thus they can be pre-computed and can be sent independently. This speeds up the protocol. (2) Clients and servers can use almost the same algorithm. This reduces the i...

متن کامل

Multi-Factor Password-Authenticated Key Exchange

We consider a new form of authenticated key exchange which we call multi-factor passwordauthenticated key exchange, where session establishment depends on successful authentication of multiple short secrets that are complementary in nature, such as a long-term password and a one-time response, allowing the client and server to be mutually assured of each other’s identity without directly disclo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2021

ISSN: ['1556-6013', '1556-6021']

DOI: https://doi.org/10.1109/tifs.2021.3116429