A Secure Authentication Framework to Guarantee the Traceability of Avatars in Metaverse

09/19/2022
by   Kedi Yang, et al.
0

Metaverse is a vast virtual environment parallel to the physical world in which users enjoy a variety of services acting as an avatar. To build a secure living habitat, it's vital to ensure the virtual-physical traceability that tracking a malicious player in the physical world via his avatars in virtual space. In this paper, we propose a two-factor authentication framework based on chameleon signature and biometric-based authentication. First, aiming at disguise in virtual space, we propose a chameleon collision signature algorithm to achieve the verifiability of the avatar's virtual identity. Second, facing at impersonation in physical world, we construct an avatar's identity model based on the player's biometric template and the chameleon key to realize the verifiability of the avatar's physical identity. Finally, we design two decentralized authentication protocols based on the avatar's identity model to ensure the consistency of the avatar's virtual and physical identities. Security analysis indicates that the proposed authentication framework guarantees the consistency and traceability of avatar's identity. Simulation experiments show that the framework not only completes the decentralized authentication between avatars but also achieves the virtual-physical tracking.

READ FULL TEXT
research
11/20/2017

The Horcrux Protocol: A Method for Decentralized Biometric-based Self-sovereign Identity

Most user authentication methods and identity proving systems rely on a ...
research
09/14/2022

Security of Virtual Reality Authentication Methods in Metaverse: An Overview

The metaverse is said to be the future Internet and will consist of seve...
research
10/01/2018

An Exploration of Blockchain Enabled Decentralized Capability based Access Control Strategy for Space Situation Awareness

Space situation awareness (SSA) includes tracking of active and inactive...
research
07/31/2020

Password-authenticated Decentralized Identities

Password-authenticated identities, where users establish username-passwo...
research
11/03/2022

From Auditable Quantum Authentication to Best-of-Both-Worlds Multiparty Quantum Computation with Public Verifiable Identifiable Abort

We construct the first secure multiparty quantum computation with public...
research
01/26/2021

Biometric Verification Secure Against Malicious Adversaries

Biometric verification has been widely deployed in current authenticatio...
research
01/27/2023

Side Auth: Synthesizing Virtual Sensors for Authentication

While the embedded security research community aims to protect systems b...

Please sign up or login with your details

Forgot password? Click here to reset