A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Two-Factor Authentication with End-to-End Password Security
[chapter]
2018
Lecture Notes in Computer Science
We present a secure two-factor authentication (TFA) scheme based on the possession by the user of a password and a crypto-capable device. Security is end-to-end" in the sense that the attacker can attack all parts of the system, including all communication links and any subset of parties (servers, devices, client terminals), can learn users' passwords, and perform active and passive attacks, online and oine. In all cases the scheme provides the highest attainable security bounds given the set
doi:10.1007/978-3-319-76581-5_15
fatcat:45ip4zwpqjb7vjrpbz2aiwmpmy