Multi-factor authentication scheme based on custom attributes

被引:0
|
作者
Zhu, Dexin [1 ,2 ]
Zhou, Hu [2 ]
Li, Nianfeng [2 ]
Song, Lijun [3 ]
Zheng, Jun [1 ]
机构
[1] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[2] Changchun Univ, Coll Comp Sci & Technol, Changchun 130022, Jilin, Peoples R China
[3] Changchun Inst Technol, Jilin Engn Lab Quantum Informat Technol, Changchun, Jilin, Peoples R China
关键词
Blockchain; Cryptographic accumulator; Authentication; Schnorr digital signature; Identity attribute; IDENTITY MANAGEMENT; IDENTIFICATION; BLOCKCHAIN;
D O I
10.1007/s10586-024-04371-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity authentication is the key technology to confirm and authorize the legal identity of users, and it plays an important role in the field of information security. However, the current user authentication attributes are usually pre-specified by the server, which has the problem of lack of flexibility. Therefore, a multi-factor authentication scheme based on custom attributes is proposed in this paper. The user creates the authentication policy tree according to the personal identity attribute factor, and constructs the authentication policy set. In order to authenticate quickly, a multi-level cryptographic accumulator is designed. The Level-One cryptographic accumulator is used to accumulate the unique identity of the user, and the Level-Two cryptographic accumulator is used to accumulate the authentication policy set of the user. Based on the untamperable property of the blockchain and combined with the Schnorr digital signature protocol, register the accumulated value and evidence of the multi-level cryptographic accumulator to the blockchain. The user's identity is authenticated by verifying the accumulated value and evidence on the blockchain. In order to verify the performance of the scheme, the throughput and average time delay of registration and authentication methods are tested and analyzed in detail. The results show that by integrating authentication policy tree, multi-level cryptographic accumulator and blockchain network, this scheme can not only achieve multi-factor authentication with custom attributes, but also maintain good performance. It has made a useful contribution to the field of multi-factor identity authentication based on custom attributes.
引用
收藏
页码:7741 / 7756
页数:16
相关论文
共 50 条
  • [1] Blockchain-Based Authentication Scheme with an Adaptive Multi-Factor Authentication Strategy
    Xu, Yanbin
    Jian, Xinya
    Li, Tao
    Zou, Shuang
    Li, Beibei
    Mobile Information Systems, 2023, 2023
  • [2] A location-based multi-factor authentication scheme for mobile devices
    Meher, Bimal Kumar
    Amin, Ruhul
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2022, 41 (03) : 181 - 190
  • [3] Cryptanalysis of a Multi-factor Biometric-Based Remote Authentication Scheme
    Boonkrong, Sirapat
    RECENT ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGY 2018, 2019, 769 : 232 - 242
  • [4] A Higher Performance Data Backup Scheme Based on Multi-Factor Authentication
    Wu, Lingfeng
    Wen, Yunhua
    Yi, Jinghai
    ENTROPY, 2024, 26 (08)
  • [5] A Lightweight Multi-factor Authentication Scheme based on Digital Watermarking Technique
    Trong-Minh Hoang
    Van-Hau Bui
    Ngoc-Tan Nguyen
    2021 INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR COMMUNICATIONS (ATC 2021), 2021, : 270 - 274
  • [6] A lightweight multi-factor mobile user authentication scheme
    Sun, Jianguo
    Zhong, Qi
    Kou, Liang
    Wang, Wenshan
    Da, Qingan
    Lin, Yun
    IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018, : 831 - 836
  • [7] Biometric multi-factor authentication: On the usability of the FingerPIN scheme
    Marasco, Emanuela
    Albanese, Massimiliano
    Patibandla, Venkata Vamsi Ram
    Vurity, Anudeep
    Sriram, Sumanth Sai
    SECURITY AND PRIVACY, 2023, 6 (01)
  • [8] Analysis and improvement of a multi-factor biometric authentication scheme
    Cao, Liling
    Ge, Wancheng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (04) : 617 - 625
  • [9] Lightweight and Secure Multi-Factor Authentication Scheme in VANETs
    Tahir, Haseeb
    Mahmood, Khalid
    Ayub, Muhammad Faizan
    Saleem, Muhammad Asad
    Ferzund, Javed
    Kumar, Neeraj
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (11) : 14978 - 14986
  • [10] ECC-Based Anonymous and Multi-factor Authentication Scheme for IoT Environment
    Dargaoui, Souhayla
    Azrour, Mourade
    El Allaoui, Ahmad
    Guezzaz, Azidine
    Alabdulatif, Abdulatif
    Ahmad, Sultan
    INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2025, 21 (01) : 56 - 75