Two-factor authentication for the Bitcoin protocol

被引:13
|
作者
Mann, Christopher [1 ]
Loebenberger, Daniel [1 ]
机构
[1] Univ Bonn, B IT, Bonn, Germany
关键词
Bitcoin; Two-party ECDSA; Two-factor authentication; Block chain; KNOWLEDGE;
D O I
10.1007/s10207-016-0325-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We show how to realize two-factor authentication for a Bitcoin wallet. To do so, we explain how to employ an ECDSA adaption of the two-party signature protocol by MacKenzie and Reiter (Int J Inf Secur 2(3-4):218-239, 2004. doi:10.1007/s10207-004-0041-0 Address="10.1007/s10207-004-0041-0") in the context of Bitcoin and present a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification over a separate channel. Since we use a smart phone as the second authentication factor, our solution can be used with hardware already available to most users and the user experience is quite similar to the existing online banking authentication methods.
引用
收藏
页码:213 / 226
页数:14
相关论文
共 50 条
  • [41] A lightweight anonymous two-factor authentication protocol for wireless sensor networks in Internet of Vehicles
    Sadri, Mohammad Javad
    Rajabzadeh Asaar, Maryam
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (14)
  • [42] Improved keylogging and shoulder-surfing resistant visual two-factor authentication protocol
    Khedr, Walid I.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 39 : 41 - 57
  • [43] Two-Factor Privacy-Preserving Protocol for Efficient Authentication in Internet of Vehicles Networks
    Al Sibahee, Mustafa A.
    Nyangaresi, Vincent Omollo
    Abduljabbar, Zaid Ameen
    Luo, Chengwen
    Zhang, Jin
    Ma, Junchao
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08): : 14253 - 14266
  • [44] Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography
    Zhang, Liping
    Tang, Shanyu
    Chen, Jing
    Zhu, Shaohui
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 81 (01) : 53 - 75
  • [45] Two-factor authentication framework for private cloud
    Gordin, Ionel
    Graur, Adrian
    Potorac, Alin
    2019 23RD INTERNATIONAL CONFERENCE ON SYSTEM THEORY, CONTROL AND COMPUTING (ICSTCC), 2019, : 255 - 259
  • [46] Two-Factor Authentication for Type 2 Immunity
    Chen, Jennifer S.
    Eisenbarth, Stephanie C.
    IMMUNITY, 2018, 49 (03) : 381 - 383
  • [47] Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography
    Liping Zhang
    Shanyu Tang
    Jing Chen
    Shaohui Zhu
    Wireless Personal Communications, 2015, 81 : 53 - 75
  • [48] Two-factor authentication underpins the precision of the piRNA pathway
    Mirandela, Madeleine Dias
    Zoch, Ansgar
    Leismann, Jessica
    Webb, Shaun
    Berrens, Rebecca V.
    Valsakumar, Devisree
    Kabayama, Yuka
    Auchynnikava, Tania
    Schito, Martina
    Chowdhury, Tamoghna
    Macleod, David
    Xiang, Xinyu
    Zou, Juan
    Rappsilber, Juri
    Allshire, Robin C.
    Voigt, Philipp
    Cook, Atlanta G.
    Barau, Joan
    O'Carroll, Donal
    NATURE, 2024, : 979 - 985
  • [49] Two-factor Distributed Authentication Scheme for Cloud Storage
    Han, Yunxia
    Xu, Chunxiang
    Li, Shanshan
    Lu, Jingjie
    2024 9TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS, ICCCS 2024, 2024, : 297 - 303
  • [50] Middle Man: An Efficient Two-Factor Authentication Framework
    Costa, Jose
    Michalas, Antonis
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,