Kontaktujte nás | Jazyk: čeština English
dc.title | Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management | en |
dc.contributor.author | Drga, Jozef | |
dc.contributor.author | Homoliak, Ivan | |
dc.contributor.author | Vančo, Juraj | |
dc.contributor.author | Vasilakos, Athanasios | |
dc.contributor.author | Perešíni, Martin | |
dc.contributor.author | Hanáček, Petr | |
dc.relation.ispartof | 2023 IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2023 | |
dc.identifier.isbn | 979-835031019-1 | |
dc.date.issued | 2023 | |
dc.event.title | 5th IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2023 | |
dc.event.location | Dubai | |
utb.event.state-en | United Arab Emirates | |
utb.event.state-cs | Spojené arabské emiráty | |
dc.event.sdate | 2023-05-01 | |
dc.event.edate | 2023-05-05 | |
dc.type | conferenceObject | |
dc.language.iso | en | |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | |
dc.identifier.doi | 10.1109/ICBC56567.2023.10174997 | |
dc.relation.uri | https://ieeexplore.ieee.org/document/10174997 | |
dc.relation.uri | https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10174997 | |
dc.description.abstract | This paper focuses on the problem of detection and prevention of stolen and misused secrets (such as private keys) for authentication toward centralized services. We propose a solution for this problem, based on SmartOTPs, the two-factor authentication scheme against the blockchain, which is intended for smart contract wallets and utilizes one-time passwords (OTPs). We modify SmartOTPs for our purposes and utilize them in the setting of two-and-a-half-factor authentication against a centralized service provider. Out of two and a half factors of our solution, the first factor stands for the private key, and the second and a half factor stands for OTPs and their precursors (a.k.a., pre-images), where OTPs are obtained from the precursors by cryptoaraphically secure hashing. We describe the protocol for bootstrapping our approach as well as the authentication procedure. In the case of stolen creden-tials from the client, we show that our solution enables the user to immediately detect it and proceed to re-initialization with fresh credentials. We utilize blockchain-based identity management and decentralized identities of users to simplify the overhead of the registration process and reinitialization. © 2023 IEEE. | en |
utb.faculty | Faculty of Applied Informatics | |
dc.identifier.uri | http://hdl.handle.net/10563/1012383 | |
utb.identifier.scopus | 2-s2.0-85166267464 | |
utb.source | d-scopus | |
dc.date.accessioned | 2025-04-07T07:16:59Z | |
dc.date.available | 2025-04-07T07:16:59Z | |
dc.description.sponsorship | Key Digital Technologies Joint Undertaking, KDT JU, (101007273, FIT-S-23-8151); Key Digital Technologies Joint Undertaking, KDT JU | |
dc.rights | Attribution 4.0 International | |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | |
dc.rights.access | openAccess | |
utb.contributor.internalauthor | Vančo, Juraj | |
utb.scopus.affiliation | Brno University of Technology, Faculty of Information Technology, Czech Republic; University of Tomas Bata, Faculty of Applied Informatics, Czech Republic; University of Agder, Norway |
Soubory | Velikost | Formát | Zobrazit |
---|---|---|---|
K tomuto záznamu nejsou připojeny žádné soubory. |