Password-authenticated Decentralized Identities

07/31/2020
by   Pawel Szalachowski, et al.
0

Password-authenticated identities, where users establish username-password pairs with individual servers and use them later on for authentication, is the most widespread user authentication method over the Internet. Although they are simple, user-friendly, and broadly adopted, they offer insecure authentication and position server operators as trusted parties, giving them full control over users' identities. To mitigate these limitations, many identity systems have embraced public-key cryptography and the concept of decentralization. All these systems, however, require users to create and manage public-private keypairs. Unfortunately, users usually do not have the required knowledge and resources to properly handle their cryptographic secrets, which arguably contributed to failures of many end-user-focused public-key infrastructures (PKIs). In fact, as for today, no end-user PKI, able to authenticate users to web servers, has a significant adoption rate. In this paper, we propose Password-authenticated Decentralized Identities (PDIDs), an identity and authentication framework where users can register their self-sovereign username-password pairs and use them as universal credentials. Our system provides global namespace, human-meaningful usernames, and resilience against username collision attacks. A user's identity can be used to authenticate the user to any server without revealing that server anything about the password, such that no offline dictionary attacks are possible against the password. We analyze PDIDs and implement it using existing infrastructures and tools. We report on our implementation and evaluation.

READ FULL TEXT
research
06/14/2021

A Novel Variable K-Pseudonym Scheme Applied to 5G Anonymous Access Authentication

Anonymous access authentication schemes provide users with massive appli...
research
08/15/2021

An authentication model based on cryptography

In this paper we proposed an authentication technique based on the user ...
research
05/10/2023

Speranza: Usable, privacy-friendly software signing

Software repositories, used for wide-scale open software distribution, a...
research
01/01/2023

TaxIdMA: Towards a Taxonomy for Attacks related to Identities

Identity management refers to the technology and policies for the identi...
research
06/13/2023

Decentralizing Custodial Wallets with MFKDF

The average cryptocurrency user today faces a difficult choice between c...
research
09/19/2022

A Secure Authentication Framework to Guarantee the Traceability of Avatars in Metaverse

Metaverse is a vast virtual environment parallel to the physical world i...
research
02/18/2022

FORT: Right-proving and Attribute-blinding Self-sovereign Authentication

Nowadays, there is a plethora of services that are provided and paid for...

Please sign up or login with your details

Forgot password? Click here to reset