Multi-factor authentication scheme based on custom attributes

被引:0
|
作者
Zhu, Dexin [1 ,2 ]
Zhou, Hu [2 ]
Li, Nianfeng [2 ]
Song, Lijun [3 ]
Zheng, Jun [1 ]
机构
[1] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[2] Changchun Univ, Coll Comp Sci & Technol, Changchun 130022, Jilin, Peoples R China
[3] Changchun Inst Technol, Jilin Engn Lab Quantum Informat Technol, Changchun, Jilin, Peoples R China
关键词
Blockchain; Cryptographic accumulator; Authentication; Schnorr digital signature; Identity attribute; IDENTITY MANAGEMENT; IDENTIFICATION; BLOCKCHAIN;
D O I
10.1007/s10586-024-04371-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity authentication is the key technology to confirm and authorize the legal identity of users, and it plays an important role in the field of information security. However, the current user authentication attributes are usually pre-specified by the server, which has the problem of lack of flexibility. Therefore, a multi-factor authentication scheme based on custom attributes is proposed in this paper. The user creates the authentication policy tree according to the personal identity attribute factor, and constructs the authentication policy set. In order to authenticate quickly, a multi-level cryptographic accumulator is designed. The Level-One cryptographic accumulator is used to accumulate the unique identity of the user, and the Level-Two cryptographic accumulator is used to accumulate the authentication policy set of the user. Based on the untamperable property of the blockchain and combined with the Schnorr digital signature protocol, register the accumulated value and evidence of the multi-level cryptographic accumulator to the blockchain. The user's identity is authenticated by verifying the accumulated value and evidence on the blockchain. In order to verify the performance of the scheme, the throughput and average time delay of registration and authentication methods are tested and analyzed in detail. The results show that by integrating authentication policy tree, multi-level cryptographic accumulator and blockchain network, this scheme can not only achieve multi-factor authentication with custom attributes, but also maintain good performance. It has made a useful contribution to the field of multi-factor identity authentication based on custom attributes.
引用
收藏
页码:7741 / 7756
页数:16
相关论文
共 50 条
  • [41] Multi-Factor Authentication to Systems Login
    ALSaleem, Bandar Omar
    Alshoshan, Abdullah, I
    2021 IEEE NATIONAL COMPUTING COLLEGES CONFERENCE (NCCC 2021), 2021, : 1092 - 1095
  • [42] Secure multi-factor remote user authentication scheme for Internet of Things environments
    Dhillon, Parwinder Kaur
    Kalra, Sheetal
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (16)
  • [43] A Multi-Factor Authentication Scheme Under the SM9 Algorithm Framework
    Zhu L.
    Wang D.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2024, 46 (05): : 2137 - 2148
  • [44] A Study of Multi-Factor and Risk-Based Authentication Availability
    Gavazzi, Anthony
    Williams, Ryan
    Kirda, Engin
    Lu, Long
    King, Andre
    Davis, Andy
    Leek, Tim
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 2043 - 2060
  • [45] Research of network payment system based on multi-factor authentication
    Yuyan, Jiang
    Changxun, Li
    Journal of Chemical and Pharmaceutical Research, 2014, 6 (07) : 437 - 441
  • [46] Multi-factor Authentication for Improved Efficiency in ECG - Based Login
    Neves, Pedro
    Nunes, Luis
    Lourenco, Andre
    PHYSICS: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON PHYSIOLOGICAL COMPUTING SYSTEMS, 2016, : 67 - 74
  • [47] An efficient multi-factor authentication scheme based CNNs for securing ATMs over cognitive-IoT
    Shalaby, Ahmed
    Gad, Ramadan
    Hemdan, Ezz El-Din
    El-Fishawy, Nawal
    PEERJ COMPUTER SCIENCE, 2021, 7 : 1 - 28
  • [48] A Reputation Management Scheme Based on Multi-factor in WSNs
    Fang Fang
    Li Jingfeng
    Li Jie
    PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 3843 - 3848
  • [49] Database Multi-factor Authentication via Pluggable Authentication Modules
    Hamilton, Cameron
    Olmstead, Aspen
    2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 367 - 368
  • [50] To Discovery The Cloud Services Authentication An Expert Based System Using Multi-Factor Authentication
    Kumar, G. Senthil
    Kandavel, N.
    Madhavan, K.
    2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 1014 - 1016