M-Pin: A Multi-Factor Zero Knowledge Authentication Protocol
نویسنده
چکیده
Here we introduce the M-Pin client-server protocol, which features two-factor client authentication as an alternative to Username/Password. Despite the mathematical complexity of the protocol we demonstrate that an M-Pin client can be implemented in an environment with limited computational capability.
منابع مشابه
Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active & Concurrent Attacks
We construct statistical zero-knowledge authentication protocols for smart cards based on general assumptions. The main protocol is only secure against active attacks, but we present a modification based on trapdoor commitments that can resist concurrent attacks as well. Both protocols are instantiated using lattice-based primitives, which are conjectured to be secure against quantum attacks. W...
متن کاملTwo Factor Zero Knowledge Proof Authentication System
It is often necessary to log onto a website or other system from an untrusted device using an untrusted connection. In this paper, we propose a login protocol that can be implemented to allow security in this situation. The protocol is a two factor authentication scheme which utilizes zero knowledge proofs to convince a server, over an unsecure connection, that the user knows his password witho...
متن کاملPrivacy Preserving Biometrics-Based and User Centric Authentication Protocol
We propose a privacy preserving biometrics-based authentication protocol by which users can authenticate to different service providers from their own devices without involving identity providers in the transactions. Authentication is performed through a zero-knowledge proof of knowledge protocol which is based on a cryptographic identity token created using the unique, repeatable and revocable...
متن کاملDesign and Implementation of a Zero-Knowledge Authentication Framework for Java Card
Zero-knowledge authentication protocols are an alternative to authentication protocols based on public key cryptography. Low processing and memory consumption make them especially suitable for implementation in smart card microprocessors, which are severely limited in processing power and memory space. This paper describes a design and implementation of a software library providing smart card a...
متن کاملStrong Theft-Proof Privacy-Preserving Biometric Authentication
Biometric authentication offers many benefits ranging from strong security guarantees to user convenience, however, remote authentication poses unique challenges which are not fully addressed by biometrics alone. We propose a new remote authentication protocol that combines possessionbased authentication and biometrics in a way that conquers the main weaknesses of both authentication methods. O...
متن کامل