Publication:
Threshold single password authentication

dc.contributor.coauthorN/A
dc.contributor.departmentN/A
dc.contributor.departmentDepartment of Computer Engineering
dc.contributor.kuauthorİşler, Devriş
dc.contributor.kuauthorKüpçü, Alptekin
dc.contributor.kuprofileMaster Student
dc.contributor.kuprofileFaculty Member
dc.contributor.otherDepartment of Computer Engineering
dc.contributor.schoolcollegeinstituteGraduate School of Sciences and Engineering
dc.contributor.schoolcollegeinstituteCollege of Engineering
dc.contributor.yokidN/A
dc.contributor.yokid168060
dc.date.accessioned2024-11-10T00:05:57Z
dc.date.issued2017
dc.description.abstractPasswords are the most widely used form of online user authentication. In a traditional setup, the user, who has a human-memorable low entropy password, wants to authenticate with a login server. Unfortunately, existing solutions in this setting are either non-portable or insecure against many attacks, including phishing, man-in-the-middle, honeypot, and offline dictionary attacks. Three previous studies (Acar et al. 2013, Bicakci et al. 2011, and Jarecki et al. 2016) provide solutions secure against offline dictionary attacks by additionally employing a storage provider (either a cloud storage or a mobile device for portability). These works provide solutions where offline dictionary attacks are impossible as long as the adversary does not corrupt both the login server and the storage provider. For the first time, improving these previous works, we provide a more secure generalized solution employing multiple storage providers, where our solution is proven secure against offline dictionary attacks as long as the adversary does not corrupt the login server and threshold-many storage providers. We define ideal and real world indistinguishability for threshold single password authentication (Threshold SPA) schemes, and formally prove security of our solution via ideal-real simulation. Our solution provides security against all the above-mentioned attacks, including phishing, man-in-the-middle, honeypot, and offline dictionary attacks, and requires no change on the server side. Thus, our solution can immediately be deployed via a browser extension (or a mobile application) and support from some storage providers. We further argue that our protocol is efficient and scalable, and provide performance numbers where the user and storage load are only a few milliseconds.
dc.description.indexedbyWoS
dc.description.indexedbyScopus
dc.description.openaccessNO
dc.description.publisherscopeInternational
dc.description.sponsoredbyTubitakEuTÜBİTAK
dc.description.sponsoredbyTubitakEuEU
dc.description.sponsorshipTUBITAK (the Scientific and Technological Research Council of Turkey) [114E487, 115E766]
dc.description.sponsorshipEuropean Union COST Action [IC1306]
dc.description.sponsorshipRoyal Society of UK Newton Advanced Fellowship [NA140464] We thank Prof. Jens Groth from University College London for his valuable comments and discussions that greatly improved the manuscript, and acknowledge the support of TUBITAK (the Scientific and Technological Research Council of Turkey) under project numbers 114E487 and 115E766, European Union COST Action IC1306, and the Royal Society of UK Newton Advanced Fellowship NA140464.
dc.description.volume10436
dc.identifier.doi10.1007/978-3-319-67816-0_9
dc.identifier.eissn1611-3349
dc.identifier.isbn978-3-319-67816-0
dc.identifier.isbn978-3-319-67815-3
dc.identifier.issn0302-9743
dc.identifier.scopus2-s2.0-85030164780
dc.identifier.urihttp://dx.doi.org/10.1007/978-3-319-67816-0_9
dc.identifier.urihttps://hdl.handle.net/20.500.14288/16533
dc.identifier.wos463362100009
dc.keywordsPassword based authentication
dc.keywordsThreshold secret sharing
dc.keywordsDictionary attack
dc.keywordsPhishing
dc.keywordsSecure
dc.languageEnglish
dc.publisherSpringer International Publishing Ag
dc.sourceData Privacy Management, Cryptocurrencies and Blockchain Technology
dc.subjectComputer science
dc.titleThreshold single password authentication
dc.typeConference proceeding
dspace.entity.typePublication
local.contributor.authorid0000-0003-4895-8827
local.contributor.authorid0000-0003-2099-2206
local.contributor.kuauthorİşler, Devriş
local.contributor.kuauthorKüpçü, Alptekin
relation.isOrgUnitOfPublication89352e43-bf09-4ef4-82f6-6f9d0174ebae
relation.isOrgUnitOfPublication.latestForDiscovery89352e43-bf09-4ef4-82f6-6f9d0174ebae

Files