Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication

04/12/2022
by   Koudai Hatakeyama, et al.
0

Public key authentication (PKA) has been deployed in various services to provide stronger authentication to users. In PKA, a user manages private keys on her devices called authenticators, and services bind the corresponding public keys to her account. To protect private keys, a user uses authenticators which never export private keys outside. On the other hand, a user regularly uses multiple authenticators like PCs and smartphones. She replaces some of her authenticators according to their lifecycle, such as purchasing new devices and losing devices. It is a burden for a user to register, update and revoke public keys in many services every time she registers new accounts with services and replaces some of her authenticators. To ease the burden, we propose a mechanism where users and services manage public keys based on the owner of authenticators and users can access services with PKA using any of their authenticators. We introduce a key pair called an Ownership Verification Key (OVK), which consists of the private key (OVSK) and the corresponding public key (OVPK). All authenticators owned by a user derive the same OVSK from the pre-shared secret called the seed. Services verify the ownership of the authenticators using the corresponding OVPK to determine whether binding the requested public key to her account. To protect user privacy while maintaining convenience, authenticators generate a different OVK for each service from the seed independently. We demonstrate the feasibility through the Proof of Concept implementation, show that our proposed mechanism achieves some security goals, and discuss how the mechanism mitigates threats not completely handled.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/14/2023

TUSH-Key: Transferable User Secrets on Hardware Key

Passwordless authentication was first tested for seamless and secure mer...
research
01/17/2019

Private Authentication: Optimal Information Theoretic Schemes

The main security service in the connected world of cyber physical syste...
research
12/02/2020

Analysis of a Decentralised Digital Token Architecture for Public Transport

Digitisation is often viewed as beneficial to a user. Where originally p...
research
12/19/2019

A Restrained Paillier Cryptosystem and Its Applications for Access Control of Common Secret

The modified Paillier cryptosystem has become extremely popular and appl...
research
09/19/2022

An Owner-managed Indirect-Permission Social Authentication Method for Private Key Recovery

In this paper, we propose a very secure and reliable owner-self-managed ...
research
07/08/2023

Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact

Containerization allows bundling applications and their dependencies int...
research
07/19/2022

Blindfold: Keeping Private Keys in PKIs and CDNs out of Sight

Public key infrastructure (PKI) is a certificate-based technology that h...

Please sign up or login with your details

Forgot password? Click here to reset