Multi-factor authentication using threshold cryptography

Multi-Factor Authentication is used as a foolproof solution to various issues involved in present day critical authentication systems. However, it comes with the overhead of employing multiple authentication programs to complete the process. Moreover, current multi-factor authentication schemes require all intermediate One Time Passwords(OTPs) to be stored for the lifetime of the authentication process. They also involve security risks whenever an authentication process requires the user's password at a public place like a Point-of-Sale terminal or an open ATM booth. This work proposes a more secure, efficient, convenient and flexible multi-factor authentication technique using threshold cryptography.

[1]  John Bloom,et al.  A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.

[2]  Maurice Mignotte,et al.  How to Share a Secret? , 1982, EUROCRYPT.

[3]  Lein Harn,et al.  Group Authentication , 2013, IEEE Transactions on Computers.

[4]  Donald E. Eastlake,et al.  Randomness Requirements for Security , 2005, RFC.

[5]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[6]  Christian Callegari,et al.  Advances in Computing, Communications and Informatics (ICACCI) , 2015 .

[7]  Ahmad-Reza Sadeghi,et al.  Security Analysis of Mobile Two-Factor Authentication Schemes , 2014 .

[8]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[9]  Nancy A. Lynch,et al.  Cryptographic protocols , 1982, STOC '82.

[10]  Dr. Talal Alkharobi Secret sharing , 2022 .

[11]  Prabhat Kumar,et al.  A Comprehensive Study on Multifactor Authentication Schemes , 2012, ACITY.