Two-factor authentication for the Bitcoin protocol

被引:13
|
作者
Mann, Christopher [1 ]
Loebenberger, Daniel [1 ]
机构
[1] Univ Bonn, B IT, Bonn, Germany
关键词
Bitcoin; Two-party ECDSA; Two-factor authentication; Block chain; KNOWLEDGE;
D O I
10.1007/s10207-016-0325-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We show how to realize two-factor authentication for a Bitcoin wallet. To do so, we explain how to employ an ECDSA adaption of the two-party signature protocol by MacKenzie and Reiter (Int J Inf Secur 2(3-4):218-239, 2004. doi:10.1007/s10207-004-0041-0 Address="10.1007/s10207-004-0041-0") in the context of Bitcoin and present a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification over a separate channel. Since we use a smart phone as the second authentication factor, our solution can be used with hardware already available to most users and the user experience is quite similar to the existing online banking authentication methods.
引用
收藏
页码:213 / 226
页数:14
相关论文
共 50 条
  • [1] Two-factor authentication for the Bitcoin protocol
    Christopher Mann
    Daniel Loebenberger
    International Journal of Information Security, 2017, 16 : 213 - 226
  • [2] Two-Factor Authentication for the Bitcoin Protocol
    Mann, Christopher
    Loebenberger, Daniel
    SECURITY AND TRUST MANAGEMENT (STM 2015), 2015, 9331 : 155 - 171
  • [3] A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes
    Lu Zhou
    Chunpeng Ge
    Chunhua Su
    Science China Information Sciences, 2020, 63
  • [4] A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes
    Lu ZHOU
    Chunpeng GE
    Chunhua SU
    ScienceChina(InformationSciences), 2020, 63 (03) : 34 - 48
  • [5] A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes
    Zhou, Lu
    Ge, Chunpeng
    Su, Chunhua
    SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (03)
  • [6] Two-factor remote authentication protocol and BAN Analysis
    Zhang, Lihua
    Bai, Erfei
    2010 SECOND ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2010, : 411 - 414
  • [7] A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment
    Wang, Chenyu
    Xu, Guoai
    Li, Wenting
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [8] An Improved Lightweight Two-Factor Authentication Protocol for IoT Applications
    Modarres, Amir Masoud Aminian
    Sarbishaei, Ghazaleh
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (05) : 6588 - 6598
  • [9] TWO-FACTOR AUTHENTICATION SYSTEM
    Tsymzhitov, Gonchik
    Zudilova, Tatiana
    Voituk, Tatiana
    INFORMATICS, GEOINFORMATICS AND REMOTE SENSING CONFERENCE PROCEEDINGS, SGEM 2016, VOL I, 2016, : 505 - 512
  • [10] On the Usability of Two-Factor Authentication
    Wang, Ding
    Wang, Ping
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 141 - 150