Multi-factor authentication scheme based on custom attributes

被引:0
|
作者
Zhu, Dexin [1 ,2 ]
Zhou, Hu [2 ]
Li, Nianfeng [2 ]
Song, Lijun [3 ]
Zheng, Jun [1 ]
机构
[1] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[2] Changchun Univ, Coll Comp Sci & Technol, Changchun 130022, Jilin, Peoples R China
[3] Changchun Inst Technol, Jilin Engn Lab Quantum Informat Technol, Changchun, Jilin, Peoples R China
关键词
Blockchain; Cryptographic accumulator; Authentication; Schnorr digital signature; Identity attribute; IDENTITY MANAGEMENT; IDENTIFICATION; BLOCKCHAIN;
D O I
10.1007/s10586-024-04371-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity authentication is the key technology to confirm and authorize the legal identity of users, and it plays an important role in the field of information security. However, the current user authentication attributes are usually pre-specified by the server, which has the problem of lack of flexibility. Therefore, a multi-factor authentication scheme based on custom attributes is proposed in this paper. The user creates the authentication policy tree according to the personal identity attribute factor, and constructs the authentication policy set. In order to authenticate quickly, a multi-level cryptographic accumulator is designed. The Level-One cryptographic accumulator is used to accumulate the unique identity of the user, and the Level-Two cryptographic accumulator is used to accumulate the authentication policy set of the user. Based on the untamperable property of the blockchain and combined with the Schnorr digital signature protocol, register the accumulated value and evidence of the multi-level cryptographic accumulator to the blockchain. The user's identity is authenticated by verifying the accumulated value and evidence on the blockchain. In order to verify the performance of the scheme, the throughput and average time delay of registration and authentication methods are tested and analyzed in detail. The results show that by integrating authentication policy tree, multi-level cryptographic accumulator and blockchain network, this scheme can not only achieve multi-factor authentication with custom attributes, but also maintain good performance. It has made a useful contribution to the field of multi-factor identity authentication based on custom attributes.
引用
收藏
页码:7741 / 7756
页数:16
相关论文
共 50 条
  • [31] CCTV-Based Multi-Factor Authentication System
    Kwon, Byoung-Wook
    Sharma, Pradip Kumar
    Park, Jong-Hyuk
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2019, 15 (04): : 904 - 919
  • [32] Multi-factor EEG-based User Authentication
    Tien Pham
    Ma, Wanli
    Dat Tran
    Phuoc Nguyen
    Dinh Phung
    PROCEEDINGS OF THE 2014 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2014, : 4029 - 4034
  • [33] A secure multi-factor ECC based authentication scheme for Cloud-IoT based healthcare services
    Dhillon, Parwinder Kaur
    Kalra, Sheetal
    JOURNAL OF AMBIENT INTELLIGENCE AND SMART ENVIRONMENTS, 2019, 11 (02) : 149 - 164
  • [34] Multi-factor User Authentication Scheme for Multi-gateway Wireless Sensor Networks
    Wang C.-Y.
    Wang D.
    Wang F.-F.
    Xu G.-A.
    Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (04): : 683 - 700
  • [35] Multi-factor authentication at jagged peak
    Gill G.
    Jones J.
    2016, Informing Science Institute (05) : 1 - 16
  • [36] Dynamic Multi-factor Authentication for Smartphone
    Yohan, Alexander
    Lo, Nai-Wei
    Lie, Henry Roes
    2016 IEEE 27TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2016, : 2448 - 2453
  • [37] Ubiquitous Desktops with Multi-factor Authentication
    Doyle, Paul
    Deegan, Mark
    O'Driscoll, Ciaran
    Gleeson, Michael
    Gillespie, Brian
    2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 201 - 206
  • [38] Enhanced Multi-factor Authentication on the Cloud
    Alyounis, Essa
    Dinah, Quanq
    INNOVATION MANAGEMENT AND SUSTAINABLE ECONOMIC COMPETITIVE ADVANTAGE: FROM REGIONAL DEVELOPMENT TO GLOBAL GROWTH, VOLS I - VI, 2015, 2015, : 69 - 77
  • [39] Practical Threshold Multi-Factor Authentication
    Li, Wenting
    Cheng, Haibo
    Wang, Ping
    Liang, Kaitai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3573 - 3588
  • [40] Commentary: Multi-factor identification and authentication
    Morrison, Rodger
    INFORMATION SYSTEMS MANAGEMENT, 2007, 24 (04) : 331 - 332