Two-factor authentication for the Bitcoin protocol

被引:12
作者
Mann, Christopher [1 ]
Loebenberger, Daniel [1 ]
机构
[1] Univ Bonn, B IT, Bonn, Germany
关键词
Bitcoin; Two-party ECDSA; Two-factor authentication; Block chain; KNOWLEDGE;
D O I
10.1007/s10207-016-0325-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We show how to realize two-factor authentication for a Bitcoin wallet. To do so, we explain how to employ an ECDSA adaption of the two-party signature protocol by MacKenzie and Reiter (Int J Inf Secur 2(3-4):218-239, 2004. doi:10.1007/s10207-004-0041-0 Address="10.1007/s10207-004-0041-0") in the context of Bitcoin and present a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification over a separate channel. Since we use a smart phone as the second authentication factor, our solution can be used with hardware already available to most users and the user experience is quite similar to the existing online banking authentication methods.
引用
收藏
页码:213 / 226
页数:14
相关论文
共 50 条
  • [31] An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree
    Yin, Xinming
    He, Junhui
    Guo, Yi
    Han, Dezhi
    Li, Kuan-Ching
    Castiglione, Arcangelo
    SENSORS, 2020, 20 (20) : 1 - 19
  • [32] "It's not actually that horrible": Exploring Adoption of Two-Factor Authentication at a University
    Colnago, Jessica
    Devlin, Summer
    Oates, Maggie
    Swoopes, Chelse
    Bauer, Lujo
    Cranor, Lorrie
    Christin, Nicolas
    PROCEEDINGS OF THE 2018 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2018), 2018,
  • [33] A secure two-factor authentication scheme for single sign-on services
    Brasee, Kaleb
    Makki, S. Kami
    Zeadally, Sherali
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (04) : 315 - 323
  • [34] Impact Assessment of Password Reset PRMitM Attack with Two-Factor Authentication
    Sasa, Kota
    Kikuchi, Hiroaki
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (07): : 2297 - 2306
  • [35] Two-factor identity authentication scheme based on blockchain and fuzzy extractor
    Di Bao
    Lin You
    Soft Computing, 2023, 27 : 1091 - 1103
  • [36] Impact Assessment of Password Reset PRMitM attack with Two-factor Authentication
    Sasa, Kota
    Kikuchi, Hiroaki
    2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2018, : 90 - 97
  • [37] The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes
    Wang, Ding
    Gu, Qianchen
    Cheng, Haibo
    Wang, Ping
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 475 - 486
  • [38] BlinKey: A Two-Factor User Authentication Method for Virtual Reality Devices
    Zhu, Huadi
    Jin, Wenqiang
    Xiao, Mingyan
    Murali, Srinivasan
    Li, Ming
    PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 2020, 4 (04):
  • [39] Two-factor identity authentication scheme based on blockchain and fuzzy extractor
    Bao, Di
    You, Lin
    SOFT COMPUTING, 2023, 27 (02) : 1091 - 1103
  • [40] An In-Depth Analysis of Password Managers and Two-Factor Authentication Tools
    Jubur, Mohammed
    Shrestha, Prakash
    Saxena, Nitesh
    ACM COMPUTING SURVEYS, 2025, 57 (05)