首页 | 本学科首页   官方微博 | 高级检索  
     


Multi-Factor Password-Authenticated Key Exchange via Pythia PRF Service
Authors:Zengpeng Li  Jiuru Wang  Chang Choi  Wenyin Zhang
Affiliation:1.College of Computer Science and Technology, Qingdao University, Qingdao, 266071, China.2 School of Information Science and Engineering, Linyi University, Linyi, 276005, China.3 IT Research Institute, Chosun University, Gwangju, 61452, South Korea.
Abstract:Multi-factor authentication (MFA) was proposed by Pointcheval et al. [Pointcheval and Zimmer (2008)] to improve the security of single-factor (and two-factor) authentication. As the backbone of multi-factor authentication, biometric data are widely observed. Especially, how to keep the privacy of biometric at the password database without impairing efficiency is still an open question. Using the vulnerability of encryption (or hash) algorithms, the attacker can still launch offline brute-force attacks on encrypted (or hashed) biometric data. To address the potential risk of biometric disclosure at the password database, in this paper, we propose a novel efficient and secure MFA key exchange (later denoted as MFAKE) protocol leveraging the Pythia PRF service and password-to-random (or PTR) protocol. Armed with the PTR protocol, a master password pwd can be translated by the user into independent pseudorandom passwords (or rwd) for each user account with the help of device (e.g., smart phone). Meanwhile, using the Pythia PRF service, the password database can avoid leakage of the local user’s password and biometric data. This is the first paper to achieve the password and biometric harden service simultaneously using the PTR protocol and Pythia PRF.
Keywords:Multi-factor authentication key exchange   biometric data   password-torandom   Pythia PRF.
点击此处可从《计算机、材料和连续体(英文)》浏览原始摘要信息
点击此处可从《计算机、材料和连续体(英文)》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号