{"title":"云环境下基于密码学的SQRL认证协议轻量级版本","authors":"Iulian Aciobanitei, Iulian Catalin Buhus, Mihai-Lica Pura","doi":"10.1109/SACI.2018.8440957","DOIUrl":null,"url":null,"abstract":"The most used authentication method is based on usernames and passwords. But this is also one of the weakest. As the two values are static, anyone who finds them can impersonate the authentic user. Over the years several new authentications principles have been proposed, such as two factor authentication based on One Time Passwords, but they have failed to gain a broad acceptance. A special kind of propositions are the authentication protocols using QR codes, from which SQRL is the most famous. From the point of view of authentication this protocol accomplishes its goals, allowing the user to authenticate to any system implementing the scheme without physical interaction except with the users smart phone which is a trustworthy device. But implementing the protocol is not exactly easy. This paper proposes a new version of SQRL that uses cloud cryptography for the needed cryptographic operations thus providing a simple and natural answer to all the hard question raised by practical implementations and without eliminating any advantages of the oriainal protocol.","PeriodicalId":126087,"journal":{"name":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Lightweight Version of SQRL Authentication Protocol Based on Cryptography in the Cloud\",\"authors\":\"Iulian Aciobanitei, Iulian Catalin Buhus, Mihai-Lica Pura\",\"doi\":\"10.1109/SACI.2018.8440957\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The most used authentication method is based on usernames and passwords. But this is also one of the weakest. As the two values are static, anyone who finds them can impersonate the authentic user. Over the years several new authentications principles have been proposed, such as two factor authentication based on One Time Passwords, but they have failed to gain a broad acceptance. A special kind of propositions are the authentication protocols using QR codes, from which SQRL is the most famous. From the point of view of authentication this protocol accomplishes its goals, allowing the user to authenticate to any system implementing the scheme without physical interaction except with the users smart phone which is a trustworthy device. But implementing the protocol is not exactly easy. This paper proposes a new version of SQRL that uses cloud cryptography for the needed cryptographic operations thus providing a simple and natural answer to all the hard question raised by practical implementations and without eliminating any advantages of the oriainal protocol.\",\"PeriodicalId\":126087,\"journal\":{\"name\":\"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)\",\"volume\":\"147 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-05-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SACI.2018.8440957\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SACI.2018.8440957","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Lightweight Version of SQRL Authentication Protocol Based on Cryptography in the Cloud
The most used authentication method is based on usernames and passwords. But this is also one of the weakest. As the two values are static, anyone who finds them can impersonate the authentic user. Over the years several new authentications principles have been proposed, such as two factor authentication based on One Time Passwords, but they have failed to gain a broad acceptance. A special kind of propositions are the authentication protocols using QR codes, from which SQRL is the most famous. From the point of view of authentication this protocol accomplishes its goals, allowing the user to authenticate to any system implementing the scheme without physical interaction except with the users smart phone which is a trustworthy device. But implementing the protocol is not exactly easy. This paper proposes a new version of SQRL that uses cloud cryptography for the needed cryptographic operations thus providing a simple and natural answer to all the hard question raised by practical implementations and without eliminating any advantages of the oriainal protocol.