Publikace UTB
Repozitář publikační činnosti UTB

Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management

Repozitář DSpace/Manakin

Zobrazit minimální záznam


dc.title Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management en
dc.contributor.author Drga, Jozef
dc.contributor.author Homoliak, Ivan
dc.contributor.author Vančo, Juraj
dc.contributor.author Vasilakos, Athanasios
dc.contributor.author Perešíni, Martin
dc.contributor.author Hanáček, Petr
dc.relation.ispartof 2023 IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2023
dc.identifier.isbn 979-835031019-1
dc.date.issued 2023
dc.event.title 5th IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2023
dc.event.location Dubai
utb.event.state-en United Arab Emirates
utb.event.state-cs Spojené arabské emiráty
dc.event.sdate 2023-05-01
dc.event.edate 2023-05-05
dc.type conferenceObject
dc.language.iso en
dc.publisher Institute of Electrical and Electronics Engineers Inc.
dc.identifier.doi 10.1109/ICBC56567.2023.10174997
dc.relation.uri https://ieeexplore.ieee.org/document/10174997
dc.relation.uri https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10174997
dc.description.abstract This paper focuses on the problem of detection and prevention of stolen and misused secrets (such as private keys) for authentication toward centralized services. We propose a solution for this problem, based on SmartOTPs, the two-factor authentication scheme against the blockchain, which is intended for smart contract wallets and utilizes one-time passwords (OTPs). We modify SmartOTPs for our purposes and utilize them in the setting of two-and-a-half-factor authentication against a centralized service provider. Out of two and a half factors of our solution, the first factor stands for the private key, and the second and a half factor stands for OTPs and their precursors (a.k.a., pre-images), where OTPs are obtained from the precursors by cryptoaraphically secure hashing. We describe the protocol for bootstrapping our approach as well as the authentication procedure. In the case of stolen creden-tials from the client, we show that our solution enables the user to immediately detect it and proceed to re-initialization with fresh credentials. We utilize blockchain-based identity management and decentralized identities of users to simplify the overhead of the registration process and reinitialization. © 2023 IEEE. en
utb.faculty Faculty of Applied Informatics
dc.identifier.uri http://hdl.handle.net/10563/1012383
utb.identifier.scopus 2-s2.0-85166267464
utb.source d-scopus
dc.date.accessioned 2025-04-07T07:16:59Z
dc.date.available 2025-04-07T07:16:59Z
dc.description.sponsorship Key Digital Technologies Joint Undertaking, KDT JU, (101007273, FIT-S-23-8151); Key Digital Technologies Joint Undertaking, KDT JU
dc.rights Attribution 4.0 International
dc.rights.uri http://creativecommons.org/licenses/by/4.0/
dc.rights.access openAccess
utb.contributor.internalauthor Vančo, Juraj
utb.scopus.affiliation Brno University of Technology, Faculty of Information Technology, Czech Republic; University of Tomas Bata, Faculty of Applied Informatics, Czech Republic; University of Agder, Norway
Find Full text

Soubory tohoto záznamu

Soubory Velikost Formát Zobrazit

K tomuto záznamu nejsou připojeny žádné soubory.

Zobrazit minimální záznam

Attribution 4.0 International Kromě případů, kde je uvedeno jinak, licence tohoto záznamu je Attribution 4.0 International