Two-factor authentication (2FA) schemes that rely on a combination of knowledge factors (e.g., PIN) and device possession have gained popularity. Some of these schemes remain secure even against strong adversaries that (a) observe the traffic between a client and server, and (b) have physical access to the client's device, or its PIN, or breach the server. However, these solutions have several shortcomings; namely, they (i) require a client to remember multiple secret values to prove its identity, (ii) involve several modular exponentiations, and (iii) are in the non-standard random oracle model. In this work, we present a 2FA protocol that resists such a strong adversary while addressing the above shortcomings. Our protocol requires a client to remember only a single secret value/PIN, does not involve any modular exponentiations, and is in a standard model. It is the first one that offers these features without using trusted chipsets. This protocol also imposes up to 40% lower communication overhead than the state-of-the-art solutions do.
翻译:依靠知识因素(如PIN)和装置拥有相结合的双要素认证(2FA)计划已经受到欢迎,其中一些计划即使针对强敌(a) 观察客户和服务器之间的交通,以及(b) 实际接触客户的装置或PIN,或破坏服务器,这些解决方案有几个缺点;即(一) 要求客户记住多种秘密价值以证明其身份,(二) 涉及若干模块式提示,以及(三) 处于非标准随机或触手模式中。在这项工作中,我们提出了一个2FA协议,在解决上述缺陷的同时抵制如此强大的对手。我们的协议要求客户只记住一个单一的秘密价值/PIN,不涉及任何模块式提示,并且处于标准模式中。这是第一个在不使用可信赖的芯片的情况下提供这些特征的方案。这项协议还规定了比国家解决方案低40%的通信管理费。