Two-factor authentication for the Bitcoin protocol

被引:13
|
作者
Mann, Christopher [1 ]
Loebenberger, Daniel [1 ]
机构
[1] Univ Bonn, B IT, Bonn, Germany
关键词
Bitcoin; Two-party ECDSA; Two-factor authentication; Block chain; KNOWLEDGE;
D O I
10.1007/s10207-016-0325-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We show how to realize two-factor authentication for a Bitcoin wallet. To do so, we explain how to employ an ECDSA adaption of the two-party signature protocol by MacKenzie and Reiter (Int J Inf Secur 2(3-4):218-239, 2004. doi:10.1007/s10207-004-0041-0 Address="10.1007/s10207-004-0041-0") in the context of Bitcoin and present a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification over a separate channel. Since we use a smart phone as the second authentication factor, our solution can be used with hardware already available to most users and the user experience is quite similar to the existing online banking authentication methods.
引用
收藏
页码:213 / 226
页数:14
相关论文
共 50 条
  • [21] The Trouble with SMS Two-Factor Authentication
    Kugler, Logan
    COMMUNICATIONS OF THE ACM, 2019, 62 (06) : 14 - 14
  • [22] Privacy Protection Method Based on Two-Factor Authentication Protocol in FRID Systems
    Xu, Guangquan
    Ren, Yuanyuan
    Han, Yuanbin
    Li, Xiaohong
    Feng, Zhiyong
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (08): : 2019 - 2026
  • [23] Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks
    Chen, Chien-Ming
    Li, Zhen
    Chaudhry, Shehzad Ashraf
    Li, Long
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [24] A Secured Two-Factor Authentication Protocol for One-Time Money Account
    Sarang, Devidas
    Shekokar, Narendra
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION, ICWICOM 2017, 2018, 19 : 29 - 38
  • [25] Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol
    Xie, Qi
    Dong, Na
    Wong, Duncan S.
    Hu, Bin
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (03) : 478 - 487
  • [26] Design and Analysis of a Provable Secure Two-Factor Authentication Protocol for Internet of Things
    Chen, Chien-Ming
    Liu, Shuangshuang
    Li, Xuanang
    Kumari, Saru
    Li, Long
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [27] A Provably Secure and Lightweight Two-Factor Authentication Protocol for Wireless Sensor Network
    Feng, Hao
    Cai, Bowen
    ELECTRONICS, 2024, 13 (21)
  • [28] An Anonymous Two-factor User Authentication Protocol for Hierarchical Wireless Sensor Network
    Fang W.
    Zhang W.
    Pan T.
    Gao Z.
    Ni Y.
    Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2020, 52 (03): : 168 - 177
  • [29] Vulnerabilities in a Two-Factor User Authentication in Multi-server Networks Protocol
    Georgescu, Adela
    INTERNATIONAL JOINT CONFERENCE SOCO'14-CISIS'14-ICEUTE'14, 2014, 299 : 495 - 504
  • [30] Two-Factor Authentication for IoT With Location Information
    Aman, Muhammad Naveed
    Basheer, Mohamed Haroon
    Sikdar, Biplab
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02): : 3335 - 3351