Multi-factor authentication scheme based on custom attributes

被引:0
|
作者
Zhu, Dexin [1 ,2 ]
Zhou, Hu [2 ]
Li, Nianfeng [2 ]
Song, Lijun [3 ]
Zheng, Jun [1 ]
机构
[1] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[2] Changchun Univ, Coll Comp Sci & Technol, Changchun 130022, Jilin, Peoples R China
[3] Changchun Inst Technol, Jilin Engn Lab Quantum Informat Technol, Changchun, Jilin, Peoples R China
关键词
Blockchain; Cryptographic accumulator; Authentication; Schnorr digital signature; Identity attribute; IDENTITY MANAGEMENT; IDENTIFICATION; BLOCKCHAIN;
D O I
10.1007/s10586-024-04371-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity authentication is the key technology to confirm and authorize the legal identity of users, and it plays an important role in the field of information security. However, the current user authentication attributes are usually pre-specified by the server, which has the problem of lack of flexibility. Therefore, a multi-factor authentication scheme based on custom attributes is proposed in this paper. The user creates the authentication policy tree according to the personal identity attribute factor, and constructs the authentication policy set. In order to authenticate quickly, a multi-level cryptographic accumulator is designed. The Level-One cryptographic accumulator is used to accumulate the unique identity of the user, and the Level-Two cryptographic accumulator is used to accumulate the authentication policy set of the user. Based on the untamperable property of the blockchain and combined with the Schnorr digital signature protocol, register the accumulated value and evidence of the multi-level cryptographic accumulator to the blockchain. The user's identity is authenticated by verifying the accumulated value and evidence on the blockchain. In order to verify the performance of the scheme, the throughput and average time delay of registration and authentication methods are tested and analyzed in detail. The results show that by integrating authentication policy tree, multi-level cryptographic accumulator and blockchain network, this scheme can not only achieve multi-factor authentication with custom attributes, but also maintain good performance. It has made a useful contribution to the field of multi-factor identity authentication based on custom attributes.
引用
收藏
页码:7741 / 7756
页数:16
相关论文
共 50 条
  • [21] Multi-Factor Authentication: A Survey
    Ometov, Aleksandr
    Bezzateev, Sergey
    Makitalo, Niko
    Andreev, Sergey
    Mikkonen, Tommi
    Koucheryavy, Yevgeni
    CRYPTOGRAPHY, 2018, 2 (01) : 1 - 31
  • [22] Multi-Factor Authentication Modeling
    Dostalek, Libor
    2019 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER INFORMATION TECHNOLOGIES (ACIT'2019), 2019, : 443 - 446
  • [23] Bypassing Multi-Factor Authentication
    Russell S.
    ITNOW, 2023, 65 (01) : 42 - 45
  • [24] Mobile Multi-Factor Authentication
    Bissada, Andrew
    Olmsted, Aspen
    2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 210 - 211
  • [25] Multi-Factor Authentication on Cloud
    Khan, Salman H.
    Akbar, M. Ali
    2015 INTERNATIONAL CONFERENCE ON DIGITAL IMAGE COMPUTING: TECHNIQUES AND APPLICATIONS (DICTA), 2015, : 548 - 554
  • [26] Security analysis and enhancements of an improved multi-factor biometric authentication scheme
    Park, YoHan
    Park, KiSung
    Lee, KyungKeun
    Song, Hwangjun
    Park, YoungHo
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (08):
  • [27] A Multi-factor Authentication Scheme to Strength Data-Storage Access
    Sail, Soufiane
    Bouden, Halima
    BIG DATA, CLOUD AND APPLICATIONS, BDCA 2018, 2018, 872 : 67 - 77
  • [28] Multi-factor identity authentication scheme for trusted sharing of cultural resources
    Wang M.
    Rui L.
    Xu S.
    Tongxin Xuebao/Journal on Communications, 2023, 44 (10): : 34 - 45
  • [29] Enhanced secure data backup scheme using multi-factor authentication
    Hu, Huidan
    Lin, Changlu
    Chang, Chin-Chen
    Chen, Lanxiang
    IET INFORMATION SECURITY, 2019, 13 (06) : 649 - 658
  • [30] A PATTERN-BASED MULTI-FACTOR AUTHENTICATION SYSTEM
    Pankhuri
    Sinha, Akash
    Shrivastava, Gulshan
    Kumar, Prabhat
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2019, 20 (01): : 101 - 112