Practical Threshold Multi-Factor Authentication

Journal Article (2021)
Author(s)

Wenting Li (Peking University)

Haibo Cheng (Peking University)

Ping Wang (Peking University)

Kaitai Liang (TU Delft - Cyber Security)

Research Group
Cyber Security
Copyright
© 2021 Wenting Li, Haibo Cheng, Ping Wang, K. Liang
DOI related publication
https://doi.org/10.1109/TIFS.2021.3081263
More Info
expand_more
Publication Year
2021
Language
English
Copyright
© 2021 Wenting Li, Haibo Cheng, Ping Wang, K. Liang
Research Group
Cyber Security
Volume number
16
Pages (from-to)
3573-3588
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Multi-factor authentication (MFA) has been widely used to safeguard high-value assets. Unlike single-factor authentication (e.g., password-only login), t-factor authentication (tFA) requires a user always to carry and present t specified factors so as to strengthen the security of login. Nevertheless, this may restrict user experience in limiting the flexibility of factor usage, e.g., the user may prefer to choose any factors at hand for login authentication. To bring back usability and flexibility without loss of security, we introduce a new notion of authentication, called (t, n) threshold MFA, that allows a user to actively choose t factors out of n based on preference. We further define the “most-rigorous” multi-factor security model for the new notion, allowing attackers to control public channels, launch active/passive attacks, and compromise/corrupt any subset of parties as well as factors. We state that the model can capture the most practical security needs in the literature. We design a threshold MFA key exchange (T-MFAKE) protocol built on the top of a threshold oblivious pseudorandom function and an authenticated key exchange protocol. Our protocol achieves the “highest-attainable” security against all attacking attempts in the context of parties/factors being compromised/corrupted. As for efficiency, our design only requires 4+t exponentiations, 2 multi-exponentiations and 2 communication rounds. Compared with existing tFA schemes, even the degenerated (t, t) version of our protocol achieves the strongest security (stronger than most schemes) and higher efficiency on computational and communication. We instantiate our design on real-world platform to highlight its practicability and efficiency.

Files

09432950.pdf
(pdf | 1.26 Mb)
License info not available