A Forward-secure Efficient Two-factor Authentication Protocol

08/04/2022
by   Steven J. Murdoch, et al.
0

Two-factor authentication (2FA) schemes that rely on a combination of knowledge factors (e.g., PIN) and device possession have gained popularity. Some of these schemes remain secure even against strong adversaries that (a) observe the traffic between a client and server, and (b) have physical access to the client's device, or its PIN, or breach the server. However, these solutions have several shortcomings; namely, they (i) require a client to remember multiple secret values to prove its identity, (ii) involve several modular exponentiations, and (iii) are in the non-standard random oracle model. In this work, we present a 2FA protocol that resists such a strong adversary while addressing the above shortcomings. Our protocol requires a client to remember only a single secret value/PIN, does not involve any modular exponentiations, and is in a standard model. It is the first one that offers these features without using trusted chipsets. This protocol also imposes up to 40

READ FULL TEXT
research
11/05/2017

Trustware: A Device-based Protocol for Verifying Client Legitimacy

Online services commonly attempt to verify the legitimacy of users with ...
research
09/04/2020

Short-Lived Forward-Secure Delegation for TLS

On today's Internet, combining the end-to-end security of TLS with Conte...
research
01/03/2022

Secret Sharing Sharing For Highly Scalable Secure Aggregation

Secure Multiparty Computation (MPC) can improve the security and privacy...
research
04/26/2012

Intelligent Automated Diagnosis of Client Device Bottlenecks in Private Clouds

We present an automated solution for rapid diagnosis of client device pr...
research
01/22/2020

An authentication protocol based on chaos and zero knowledge proof

Port Knocking is a method for authenticating clients through a closed st...
research
05/18/2023

Amplification by Shuffling without Shuffling

Motivated by recent developments in the shuffle model of differential pr...
research
09/21/2021

STAR: Distributed Secret Sharing for Private Threshold Aggregation Reporting

In practice and research, threshold aggregation systems  –  that attempt...

Please sign up or login with your details

Forgot password? Click here to reset