Two-factor authentication for the Bitcoin protocol

被引:12
作者
Mann, Christopher [1 ]
Loebenberger, Daniel [1 ]
机构
[1] Univ Bonn, B IT, Bonn, Germany
关键词
Bitcoin; Two-party ECDSA; Two-factor authentication; Block chain; KNOWLEDGE;
D O I
10.1007/s10207-016-0325-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We show how to realize two-factor authentication for a Bitcoin wallet. To do so, we explain how to employ an ECDSA adaption of the two-party signature protocol by MacKenzie and Reiter (Int J Inf Secur 2(3-4):218-239, 2004. doi:10.1007/s10207-004-0041-0 Address="10.1007/s10207-004-0041-0") in the context of Bitcoin and present a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification over a separate channel. Since we use a smart phone as the second authentication factor, our solution can be used with hardware already available to most users and the user experience is quite similar to the existing online banking authentication methods.
引用
收藏
页码:213 / 226
页数:14
相关论文
共 50 条
  • [41] PPGPass: Nonintrusive and Secure Mobile Two-Factor Authentication via Wearables
    Cao, Yetong
    Zhang, Qian
    Li, Fan
    Yang, Song
    Wang, Yu
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2020, : 1917 - 1926
  • [42] Secure Mobile Two-Factor Authentication Leveraging Active Sound Sensing
    Ren, Yanzhi
    Chen, Chen
    Liu, Hongbo
    Yu, Jiadi
    Zheng, Zhourong
    Chen, Yingying
    Huang, Pengcheng
    Li, Hongwei
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (02) : 1262 - 1277
  • [43] Proximity-Proof: Secure and Usable Mobile Two-Factor Authentication
    Han, Dianqi
    Chen, Yimin
    Li, Tao
    Zhang, Rui
    Zhang, Yaochao
    Hedgpeth, Terri
    MOBICOM'18: PROCEEDINGS OF THE 24TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2018, : 401 - 415
  • [44] Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
    Wang, Ding
    Wang, Ping
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) : 708 - 722
  • [45] A Two-factor based Remote User Authentication Scheme using ElGamal Cryptosystem
    Soni, Preeti
    Ali, Rifaqat
    Pal, Arup Kumar
    IOTSEC'17: PROCEEDINGS OF THE ACM WORKSHOP ON INTERNET OF THINGS (IOT) SECURITY: ISSUES AND INNOVATIONS, 2017,
  • [46] User Perceptions of Security and Usability of Mobile-Based Single Password Authentication and Two-Factor Authentication
    Isler, Devris
    Kupcu, Alptekin
    Coskun, Aykut
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2019, 11737 : 99 - 117
  • [47] Online Security Behaviour: Factors Influencing Intention to Adopt Two-Factor Authentication
    Holmes, Mitch
    Ophoff, Jacques
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019), 2019, : 123 - 132
  • [48] Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
    Wang, Ding
    He, Debiao
    Wang, Ping
    Chu, Chao-Hsien
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (04) : 428 - 442
  • [49] TrustTokenF: a Generic Security Framework for Mobile Two-factor Authentication Using TrustZone
    Zhang, Yingjun
    Zhao, Shijun
    Qin, Yu
    Yang, Bo
    Feng, Dengguo
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 41 - 48
  • [50] Advanced security of two-factor authentication system using stego QR code
    Kouraogo Y.
    Orhanou G.
    Elhajji S.
    International Journal of Information and Computer Security, 2020, 12 (04) : 436 - 449