Practical Threshold Multi-Factor Authentication

被引:21
作者
Li, Wenting [1 ]
Cheng, Haibo [2 ]
Wang, Ping [1 ,3 ,4 ]
Liang, Kaitai [5 ]
机构
[1] Peking Univ, Sch Software & Microelect, Beijing 100871, Peoples R China
[2] Peking Univ, Sch Elect Engn & Comp Sci, Beijing 100871, Peoples R China
[3] Natl Engn Res Ctr Software Engn, Beijing 100871, Peoples R China
[4] Peking Univ, Key Lab High Confidence Software Technol, Minist Educ, Beijing 100871, Peoples R China
[5] Delft Univ Technol, Dept Intelligent Syst, NL-2628 Delft, Netherlands
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Threshold; multi-factor authentication; key exchange; password; KEY EXCHANGE; SECURE; BIOMETRICS; SCHEME;
D O I
10.1109/TIFS.2021.3081263
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Multi-factor authentication (MFA) has been widely used to safeguard high-value assets. Unlike single-factor authentication (e.g., password-only login), t-factor authentication (tFA) requires a user always to carry and present t specified factors so as to strengthen the security of login. Nevertheless, this may restrict user experience in limiting the flexibility of factor usage, e.g., the user may prefer to choose any factors at hand for login authentication. To bring back usability and flexibility without loss of security, we introduce a new notion of authentication, called (t, n) threshold MFA, that allows a user to actively choose t factors out of n based on preference. We further define the "most-rigorous" multi-factor security model for the new notion, allowing attackers to control public channels, launch active/passive attacks, and compromise/corrupt any subset of parties as well as factors. We state that the model can capture the most practical security needs in the literature. We design a threshold MFA key exchange (T-MFAKE) protocol built on the top of a threshold oblivious pseudorandom function and an authenticated key exchange protocol. Our protocol achieves the "highest-attainable" security against all attacking attempts in the context of parties/factors being compromised/corrupted. As for efficiency, our design only requires 4+t exponentiations, 2 multi-exponentiations and 2 communication rounds. Compared with existing tFA schemes, even the degenerated (t, t) version of our protocol achieves the strongest security (stronger than most schemes) and higher efficiency on computational and communication. We instantiate our design on real-world platform to highlight its practicability and efficiency.
引用
收藏
页码:3573 / 3588
页数:16
相关论文
共 48 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]   Universally Composable Relaxed Password Authenticated Key Exchange [J].
Abdalla, Michel ;
Barbosa, Manuel ;
Bradley, Tatiana ;
Jarecki, Stanislaw ;
Katz, Jonathan ;
Xu, Jiayu .
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT I, 2020, 12170 :278-307
[3]   PASTA: PASsword-based Threshold Authentication [J].
Agrawal, Shashank ;
Miao, Peihan ;
Mohassel, Payman ;
Mukherjee, Pratyay .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :2042-2059
[4]  
[Anonymous], 2008, HAVE BEEN PWNED
[5]  
Barbosa M, 2021, P S P, P123
[6]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[7]  
Bellare M., 1994, LNCS, V773, P232, DOI DOI 10.1007/3-540-48329-2_21
[8]  
BELLOVIN SM, 1992, 1992 IEEE COMPUTER SOCIETY SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY : PROCEEDINGS, P72
[9]   Designing Blockchain-Based Access Control Protocol in IoT-Enabled Smart-Grid System [J].
Bera, Basudeb ;
Saha, Sourav ;
Das, Ashok Kumar ;
Vasilakos, Athanasios V. .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) :5744-5761
[10]   Chip and Skim: cloning EMV cards with the pre-play attack [J].
Bond, Mike ;
Choudary, Omar ;
Murdoch, Steven J. ;
Skorobogatov, Sergei ;
Anderson, Ross .
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, :49-64