A DISTRIBUTED AUTHENTICATION ARCHITECTURE AND PROTOCOL. Skracic, K., Pale, P., & Jeren, B. TEHNICKI VJESNIK-TECHNICAL GAZETTE, 24(2):303–311, UNIV OSIJEK, TECH FAC, TRG IVANE BRLIC-MAZURANIC 2, SLAVONSKI BROD, HR-35000, CROATIA, September, 2017.
doi  abstract   bibtex   
Most user authentication methods rely on a single verifier being stored at a central location within the information system. Such information storage presents a single point of compromise from a security perspective. If this system is compromised it poses a direct threat to users' digital identities if the verifier can be extracted from the system. This paper proposes a distributed authentication environment in which there is no such single point of compromise. We propose an architecture that does not rely on a single verifier to authenticate users, but rather a distributed authentication architecture where several authentication servers are used to authenticate a user. We consider an authentication environment in which the user authentication process is distributed among independent servers. Each server independently performs its own authentication of the user, for example by asking the user to complete a challenge in order to prove his claim to a digital identity. The proposed architecture allows each server to use any authentication factor. We provide a security analysis of the proposed architecture and protocol, which shows they are secure against the attacks chosen in the analysis.
@article{WOS:000412257500010,
abstract = {Most user authentication methods rely on a single verifier being stored
at a central location within the information system. Such information
storage presents a single point of compromise from a security
perspective. If this system is compromised it poses a direct threat to
users' digital identities if the verifier can be extracted from the
system. This paper proposes a distributed authentication environment in
which there is no such single point of compromise. We propose an
architecture that does not rely on a single verifier to authenticate
users, but rather a distributed authentication architecture where
several authentication servers are used to authenticate a user. We
consider an authentication environment in which the user authentication
process is distributed among independent servers. Each server
independently performs its own authentication of the user, for example
by asking the user to complete a challenge in order to prove his claim
to a digital identity. The proposed architecture allows each server to
use any authentication factor. We provide a security analysis of the
proposed architecture and protocol, which shows they are secure against
the attacks chosen in the analysis.},
address = {TRG IVANE BRLIC-MAZURANIC 2, SLAVONSKI BROD, HR-35000, CROATIA},
author = {Skracic, Kristian and Pale, Predrag and Jeren, Branko},
doi = {10.17559/TV-20151114105745},
issn = {1330-3651},
journal = {TEHNICKI VJESNIK-TECHNICAL GAZETTE},
keywords = {authentication factors; digital identity; distribu},
month = sep,
number = {2},
pages = {303--311},
publisher = {UNIV OSIJEK, TECH FAC},
title = {{A DISTRIBUTED AUTHENTICATION ARCHITECTURE AND PROTOCOL}},
type = {Article},
volume = {24},
year = {2017}
}

Downloads: 0