Enhancing Security in User-Centered Authentication using KERI

被引:0
作者
Boi, Biagio [1 ]
De Santis, Marco [1 ]
Esposito, Christian [1 ]
机构
[1] Univ Salerno, Dept Comp Sci, Salerno, Italy
来源
2024 32ND EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING, PDP 2024 | 2024年
关键词
Authentication; Web Authentication; User-Centric Authentication; Key Event Receipt Infrastructure (KERI); Security;
D O I
10.1109/PDP62718.2024.00030
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the context of the widespread adoption of user-centric authentication methods, safeguarding the confidentiality of private keys during the exchange of credentials has become a critical concern. Key Event Receipt Infrastructure (KERI), distinguished by its distinctive design focusing on key events and receipts, aligns seamlessly with the ethos of user-centric authentication, eschewing the necessity for blockchain integration. This research leverages the architectural model of KERI to discern potential implications within the contemporary landscape of Self-Sovereign Identity (SSI) ecosystems, thereby contributing to the evolution of identity management practices. The need for this research arises from the recognition that while SSI obviates the need for central authorities, thereby augmenting privacy and security, the imperative to preserve and securely store private keys persists. Our primary findings confirm that the integration of KERI within the SSI ecosystem provides a more resilient protocol for authentication by preventing the exchange of any kind of key used for the generation of the proof. This approach aims to prevent attacks in line with the principles of decentralization and trustlessness inherent in blockchain technologies. This research contributes to the expanding body of literature devoted to security and access management within the dynamic realm of user-centric applications and authentication.
引用
收藏
页码:161 / 166
页数:6
相关论文
共 17 条
[1]   Distributed Attestation Revocation in Self-Sovereign Identity [J].
Chotkan, Rowdy ;
Decouchant, Jeremie ;
Pouwelse, Johan .
PROCEEDINGS OF THE 2022 47TH IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2022), 2022, :414-421
[2]   Decentralized and Self-Sovereign Identity: Systematic Mapping Study [J].
Cucko, Spela ;
Turkanovic, Muhamed .
IEEE ACCESS, 2021, 9 :139009-139027
[3]   Continuous authentication using biometrics: An advanced review [J].
Dahia, Gabriel ;
Jesus, Leone ;
Pamplona Segundo, Mauricio .
WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2020, 10 (04)
[4]  
Freitag A., 2022, arXiv
[5]  
Hoess A, 2022, Hawaii Int Con Sys S, P4621
[6]   Decentralized secure storage of medical records using Blockchain and IPFS: A comparative analysis with future directions [J].
Kumar, Shivansh ;
Bharti, Aman Kumar ;
Amin, Ruhul .
SECURITY AND PRIVACY, 2021, 4 (05)
[7]   Impossibility of Full Decentralization in Permissionless Blockchains [J].
Kwon, Yujin ;
Liu, Jian ;
Kim, Minjeong ;
Song, Dawn ;
Kim, Yongdae .
AFT'19: PROCEEDINGS OF THE 1ST ACM CONFERENCE ON ADVANCES IN FINANCIAL TECHNOLOGIES, 2019, :110-123
[8]  
Lesavre L, 2020, Arxiv, DOI arXiv:1908.00929
[9]  
Smith SM, 2021, Arxiv, DOI arXiv:1907.02143
[10]  
Mahula S., 2021, DG O2021, P495