Practical Threshold Multi-Factor Authentication
نویسندگان
چکیده
Multi-factor authentication (MFA) has been widely used to safeguard high-value assets. Unlike single-factor (e.g., password-only login), t-factor ( tFA) requires a user always carry and present t specified factors so as strengthen the security of login. Nevertheless, this may restrict experience in limiting flexibility factor usage, e.g., prefer choose any at hand for login authentication. To bring back usability without loss security, we introduce new notion authentication, called (t,n) threshold MFA, that allows actively out n based on preference. We further define “most-rigorous” multi-factor model notion, allowing attackers control public channels, launch active/passive attacks, compromise/corrupt subset parties well factors. state can capture most practical needs literature. design MFA key exchange (T-MFAKE) protocol built top oblivious pseudorandom function an authenticated protocol. Our achieves “highest-attainable” against all attacking attempts context parties/factors being compromised/corrupted. As efficiency, our only 4+t exponentiations, 2 multi-exponentiations 2 communication rounds. Compared with existing tFA schemes, even degenerated (t,t) version strongest (stronger than schemes) higher efficiency computational communication. instantiate real-world platform highlight its practicability efficiency.
منابع مشابه
Multi-Factor Authentication: A Survey †
Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a hyper-connected world, including online payments, communications, access right management, etc. This work sheds light on the evolution of authentication systems towards Multi-Factor Authentication (MFA) st...
متن کاملClient-Server Multi-Factor Authentication Using Pairings
What would be the ideal attributes of a client-server authentication scheme? One might like an identity based scheme not requiring PKI, plus support for multi-factor authentication based on a token, a PIN number, and optionally a biometric. The former might hold a high-entropy secret, and the latter may be represented as relatively lowentropy parameters. However it would be preferred if the tok...
متن کاملPractical Covert Authentication
Von Ahn, Hopper, and Langford [vAHL05] introduced the notion of two-party steganographic a.k.a. covert computation, which assures that neither party can distinguish its counterparty from a random noise generator, except for what is revealed by the final output of the securely computed function. The flagship motivation for covert computation is covert authentication, where two parties want to au...
متن کاملPractical Message Authentication Schemes
Use of encryption algorithms in message authentication is replaced by secure hash functions which are often faster than encryption algorithms. Tsudik 14] has proposed three methods on message authentication which are only based on one-way hash functions and use some keys to make them secure. In this paper, we give a set of practical methods, each of which uses a fast collision free hash functio...
متن کاملPractical Threshold Signatures
We present an RSA threshold signature scheme. The scheme enjoys the following properties: 1. it is unforgeable and robust in the random oracle model, assuming the RSA problem is hard; 2. signature share generation and verification is completely non-interactive; 3. the size of an individual signature share is bounded by a constant times the size of the RSA modulus.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2021
ISSN: ['1556-6013', '1556-6021']
DOI: https://doi.org/10.1109/tifs.2021.3081263