PROTECT: Efficient Password-Based Threshold Single-Sign-On Authentication for Mobile Users against Perpetual Leakage

Yuan Zhang,Chunxiang Xu,Hongwei Li,Kan Yang,Nan Cheng,Xuemin Shen
DOI: https://doi.org/10.1109/tmc.2020.2975792
IF: 6.075
2021-06-01
IEEE Transactions on Mobile Computing
Abstract:Password-based single-sign-on authentication has been widely applied in mobile environments. It enables an identity server to issue authentication tokens to mobile users holding correct passwords. With an authentication token, one can request mobile services from related service providers without multiple registrations. However, if an adversary compromises the identity server, he can retrieve users' passwords by performing dictionary guessing attacks (DGA) and can overissue authentication tokens to break the security. In this paper, we propose a password-based threshold single-sign-on authentication scheme dubbed PROTECT that thwarts adversaries who can compromise identity server(s), where multiple identity servers are introduced to authenticate mobile users and issue authentication tokens in a threshold way. PROTECT supports key renewal that periodically updates the secret on each identity server to resist perpetual leakage of the secret. Furthermore, PROTECT is secure against off-line DGA: a credential used to authenticate a user is computed from the password and a server-side key. PROTECT is also resistant to online DGA and password testing attacks in an efficient way. We conduct a comprehensive performance evaluation of PROTECT, which demonstrates the high efficiency on the user side in terms of computation and communication and proves that it can be easily deployed on mobile devices.
computer science, information systems,telecommunications
What problem does this paper attempt to address?
The paper primarily addresses the problem of creating complex three-dimensional composite structures in electromagnetic simulations. Traditional manual creation methods are biased and unable to represent the actual manufacturing process of composite materials, and they cannot easily achieve high-density packing and anisotropy commonly seen in nature. Researchers utilize the Bullet physics library (software typically used for advanced computer games) to automate the generation of crystals with random shapes, sizes, and orientations, which are then embedded into a matrix to form a composite material mixture. Simulating the process of crystal collision and arrangement in a box allows for higher packing density than manual construction. These structures are subsequently imported into electromagnetic simulation software, such as CST Microwave Studio, to study the localization phenomenon of energy in materials containing many irregular crystals. This approach makes the creation of complex three-dimensional crystal mixtures more efficient and realistic, aiding in engineering analysis and the study of energy propagation behavior.