{"title":"Edge Oriented Redistribution of Computational Load for Authentication Systems","authors":"Zakaria EI-Awadi, Manki Min","doi":"10.1109/INFOCOMWKSHPS57453.2023.10226059","DOIUrl":null,"url":null,"abstract":"Having an authentication system that is secure can be rather computationally expensive on the server and even affect user experience. This can affect user experience due to high demand by many users during the authentication process. Furthermore, users may find an authentication system that requires more interaction to be inconvenient and may opt out of the current standard 2FA options. We propose a method of using hash chains that are computed on the client side, by a verified device, to alleviate some computational overhead of a server, while also providing high security during the transmission of secure information. This system hopes to be less inconvenient for a user by only requiring them to type in a username/password and scan a QR Code.","PeriodicalId":354290,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10226059","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Having an authentication system that is secure can be rather computationally expensive on the server and even affect user experience. This can affect user experience due to high demand by many users during the authentication process. Furthermore, users may find an authentication system that requires more interaction to be inconvenient and may opt out of the current standard 2FA options. We propose a method of using hash chains that are computed on the client side, by a verified device, to alleviate some computational overhead of a server, while also providing high security during the transmission of secure information. This system hopes to be less inconvenient for a user by only requiring them to type in a username/password and scan a QR Code.