Two-factor authentication for the Bitcoin protocol

被引:13
|
作者
Mann, Christopher [1 ]
Loebenberger, Daniel [1 ]
机构
[1] Univ Bonn, B IT, Bonn, Germany
关键词
Bitcoin; Two-party ECDSA; Two-factor authentication; Block chain; KNOWLEDGE;
D O I
10.1007/s10207-016-0325-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We show how to realize two-factor authentication for a Bitcoin wallet. To do so, we explain how to employ an ECDSA adaption of the two-party signature protocol by MacKenzie and Reiter (Int J Inf Secur 2(3-4):218-239, 2004. doi:10.1007/s10207-004-0041-0 Address="10.1007/s10207-004-0041-0") in the context of Bitcoin and present a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification over a separate channel. Since we use a smart phone as the second authentication factor, our solution can be used with hardware already available to most users and the user experience is quite similar to the existing online banking authentication methods.
引用
收藏
页码:213 / 226
页数:14
相关论文
共 50 条
  • [31] Cryptocurrencies with Security Policies and Two-Factor Authentication
    Breuer, Florian
    Goyal, Vipul
    Malavolta, Giulio
    2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2021), 2021, : 140 - 158
  • [32] Improved Two-Factor Authentication Protocol Based on Biometric Feature and Password for Cloud Service
    Song, Jian
    Xu, Bo-ru
    Zhang, Guo-chao
    Li, Guang-song
    Ma, Chuan-gui
    Ge, Ai-jun
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 90 - 100
  • [33] An efficient two-factor authentication protocol based on elliptic curve cryptosystem with provable security
    Chen, Yulei
    Chen, Jianhua
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (09)
  • [34] Robust Two-factor Smart Card Authentication
    Candan, Omer Mert
    Levi, Albert
    2017 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2017, : 184 - 188
  • [35] BeamAuth: Two-Factor Web Authentication with a Bookmark
    Adida, Ben
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 48 - 57
  • [36] Survey on Usable and Secure Two-Factor Authentication
    Archana, B. S.
    Chandrashekar, Ashika
    Bangi, Anusha Govind
    Sanjana, B. M.
    Akram, Syed
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 842 - 846
  • [37] A Usable and Secure Two-Factor Authentication Scheme
    Akram, Syed
    Misbahuddin, Mohammed
    Varaprasad, G.
    INFORMATION SECURITY JOURNAL, 2012, 21 (04): : 169 - 182
  • [38] Pseudo Code of Two-factor Authentication for BYOD
    Jaha, Farida
    Kartit, Ali
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON ELECTRICAL AND INFORMATION TECHNOLOGIES (ICEIT 2017), 2017,
  • [39] A novel Two-Factor HoneyToken Authentication Mechanism
    Papaspirou, Vassilis
    Maglaras, Leandros
    Ferrag, Mohamed Amine
    Kantzavelou, Ioanna
    Janicke, Helge
    Douligeris, Christos
    30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021), 2021,
  • [40] Modeling and Analysis of Two-factor Authentication Protocol for USB Digital Evidence Acquisition Devices
    Laptikultham, Siripoom
    Tritilanunt, Suratose
    PROCEEDINGS OF THE 2015 12TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (JCSSE), 2015, : 241 - 246