2022
DOI: 10.48550/arxiv.2208.02877
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Forward-secure Efficient Two-factor Authentication Protocol

Abstract: Two-factor authentication (2FA) schemes that rely on a combination of knowledge factors (e.g., PIN) and device possession have gained popularity. Some of these schemes remain secure even against strong adversaries that (a) observe the traffic between a client and server, and (b) have physical access to the client's device, or its PIN, or breach the server. However, these solutions have several shortcomings; namely, they (i) require a client to remember multiple secret values to prove its identity, (ii) involve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 20 publications
(45 reference statements)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?