Publication:
Single password authentication

dc.contributor.coauthorAcar, Tolga
dc.contributor.coauthorBelenkiy, Mira
dc.contributor.departmentDepartment of Computer Engineering
dc.contributor.kuauthorKüpçü, Alptekin
dc.contributor.kuprofileFaculty Member
dc.contributor.otherDepartment of Computer Engineering
dc.contributor.schoolcollegeinstituteCollege of Engineering
dc.contributor.yokid168060
dc.date.accessioned2024-11-09T11:43:07Z
dc.date.issued2013
dc.description.abstractUsers frequently reuse their passwords when authenticating to various online services. Combined with the use of weak passwords or honeypot/phishing attacks, this brings high risks to the security of the user’s account information. In this paper, we propose several protocols that can allow a user to use a single password to authenticate to multiple services securely. All our constructions provably protect the user from dictionary attacks on the password, and cross-site impersonation or honeypot attacks by the online service providers. Our solutions assume the user has access to either an untrusted online cloud storage service (as per Boyen [16]), or a mobile storage device that is trusted until stolen. In the cloud storage scenario, we consider schemes that optimize for either storage server or online service performance, as well as anonymity and unlinkability of the user’s actions. In the mobile storage scenario, we minimize the assumptions we make about the capabilities of the mobile device: we donotassume synchronization, tamper resistance, special or expensive hardware, or extensive cryptographic capabilities. Most importantly, the user’s password remains secure even after the mobile device is stolen. Our protocols provide another layer of security against malware and phishing. To the best of our knowledge, we are the first to propose such various and provably secure password-based authentication schemes. Lastly, we argue that our constructions are relatively easy to deploy, especially if a few single sign-on services (e.g., Microsoft, Google, and Facebook) adopt our proposal.
dc.description.fulltextYES
dc.description.indexedbyWoS
dc.description.indexedbyScopus
dc.description.issue13
dc.description.openaccessYES
dc.description.publisherscopeInternational
dc.description.sponsoredbyTubitakEuN/A
dc.description.sponsorshipN/A
dc.description.versionAuthor's final manuscript
dc.description.volume57
dc.formatpdf
dc.identifier.doi10.1016/j.comnet.2013.05.007
dc.identifier.embargoNO
dc.identifier.filenameinventorynoIR00252
dc.identifier.issn1389-1286
dc.identifier.linkhttps://doi.org/10.1016/j.comnet.2013.05.007
dc.identifier.quartileQ1
dc.identifier.scopus2-s2.0-84880921207
dc.identifier.urihttps://hdl.handle.net/20.500.14288/297
dc.identifier.wos324349900009
dc.keywordsPassword-based authentication
dc.keywordsDictionary attacks
dc.keywordsMalware
dc.keywordsHoneypots
dc.keywordsPrivacy
dc.keywordsMobile
dc.languageEnglish
dc.publisherElsevier
dc.relation.urihttp://cdm21054.contentdm.oclc.org/cdm/ref/collection/IR/id/1277
dc.sourceComputer Networks
dc.subjectComputer engineering
dc.subjectTelecommunications
dc.titleSingle password authentication
dc.typeJournal Article
dspace.entity.typePublication
local.contributor.authorid0000-0003-2099-2206
local.contributor.kuauthorKüpçü, Alptekin
relation.isOrgUnitOfPublication89352e43-bf09-4ef4-82f6-6f9d0174ebae
relation.isOrgUnitOfPublication.latestForDiscovery89352e43-bf09-4ef4-82f6-6f9d0174ebae

Files

Original bundle

Now showing 1 - 1 of 1
Thumbnail Image
Name:
1277.pdf
Size:
685.99 KB
Format:
Adobe Portable Document Format