Accountable authentication with privacy protection: The Larch system for universal login

05/30/2023
by   Emma Dauterman, et al.
0

Credential compromise is hard to detect and hard to mitigate. To address this problem, we present larch, an accountable authentication framework with strong security and privacy properties. Larch protects user privacy while ensuring that the larch log server correctly records every authentication. Specifically, an attacker who compromises a user's device cannot authenticate without creating evidence in the log, and the log cannot learn which web service (relying party) the user is authenticating to. To enable fast adoption, larch is backwards-compatible with relying parties that support FIDO2, TOTP, and password-based login. Furthermore, larch does not degrade the security and privacy a user already expects: the log server cannot authenticate on behalf of a user, and larch does not allow relying parties to link a user across accounts. We implement larch for FIDO2, TOTP, and password-based login. Given a client with four cores and a log server with eight cores, an authentication with larch takes 150ms for FIDO2, 91ms for TOTP, and 74ms for passwords (excluding preprocessing, which takes 1.23s for TOTP).

READ FULL TEXT

page 1

page 4

page 5

page 12

research
09/14/2022

Cryptanalysis of a privacy-preserving behavior-oriented authentication scheme

Continuous authentication has been proposed as a complementary security ...
research
04/19/2018

Anonymous Single-Sign-On for n designated services with traceability

Anonymous Single-Sign-On authentication schemes have been proposed to al...
research
02/24/2020

EL PASSO: Privacy-preserving, Asynchronous Single Sign-On

We introduce EL PASSO, a privacy-preserving, asynchronous Single Sign-On...
research
08/15/2021

An authentication model based on cryptography

In this paper we proposed an authentication technique based on the user ...
research
11/20/2018

Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication

Current authentication methods on the Web have serious weaknesses. First...
research
07/18/2020

Quantum-Secure Authentication via Abstract Multi-Agent Interaction

Current methods for authentication based on public-key cryptography are ...
research
08/08/2021

An Anonymous On-Street Parking Authentication Scheme via Zero-Knowledge Set Membership Proof

The amount of information generated grows as more and more sensor and Io...

Please sign up or login with your details

Forgot password? Click here to reset