Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, & Practical Key Management

被引:0
|
作者
Nair, Vivek [1 ]
Song, Dawn [1 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
来源
PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM | 2023年
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present the first general construction of a Multi-Factor Key Derivation Function (MFKDF). Our function expands upon password-based key derivation functions (PBKDFs) with support for using other popular authentication factors like TOTP, HOTP, and hardware tokens in the key derivation process. In doing so, it provides an exponential security improvement over PBKDFs with less than 12 ms of additional computational overhead in a typical web browser. We further present a threshold MFKDF construction, allowing for client-side key recovery and reconstitution if a factor is lost. Finally, by "stacking" derived keys, we provide a means of cryptographically enforcing arbitrarily specific key derivation policies. The result is a paradigm shift toward direct cryptographic protection of user data using all available authentication factors, with no noticeable change to the user experience. We demonstrate the ability of our solution to not only significantly improve the security of existing systems implementing PBKDFs, but also to enable new applications where PBKDFs would not be considered a feasible approach.
引用
收藏
页码:2097 / 2114
页数:18
相关论文
共 50 条
  • [31] Key management for secure Internet multicast using Boolean function minimization techniques
    Chang, Isabella
    Engel, Robert
    Kandlur, Dilip
    Pendarakis, Dimitrios
    Saha, Debanjan
    Proceedings - IEEE INFOCOM, 1999, 2 : 689 - 698
  • [32] Key management for secure Internet multicast using Boolean function minimization techniques
    Chang, I
    Engel, R
    Kandlur, D
    Pendarakis, D
    Saha, D
    IEEE INFOCOM '99 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: THE FUTURE IS NOW, 1999, : 689 - 698
  • [33] A hybrid fast approach to secure group-oriented management of key trees on Internet
    You, Chien-Ming
    Horng, Mong-Fong
    Kuo, Yau-Hwang
    Du, Wan-Ling
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 43 - +
  • [34] Provably secure group key management scheme based on proxy re-encryption with constant public bulletin size and key derivation time
    Gaurav Pareek
    B R Purushothama
    Sādhanā, 2018, 43
  • [35] Provably secure group key management scheme based on proxy re-encryption with constant public bulletin size and key derivation time
    Pareek, Gaurav
    Purushothama, B. R.
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2018, 43 (09):
  • [36] A Practical and UC-Secure Decentralized Key Management and Authentication Scheme Based on Blockchain for VNDN
    Guo, Xian
    Almadhehagi, Sarah
    Feng, Tao
    Zhang, Di
    Jiang, Yongbo
    Fang, Junli
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2024, 21 (03) : 725 - 757
  • [37] Discovering key regulatory mechanisms from single-factor and multi-factor regulations in glioblastoma utilizing multi-dimensional data
    Peng, Chen
    Shen, Yi
    Ge, Mengqu
    Wang, Minghui
    Li, Ao
    MOLECULAR BIOSYSTEMS, 2015, 11 (08) : 2345 - 2353
  • [38] Comments on "A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things"
    Shamshad, Salman
    Mahmood, Khalid
    Kumari, Saru
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (01) : 463 - 466
  • [39] Spatiotemporal Characteristics of Multi-factor Synergy in Urban Key Water Bodies of Wuhan from 1979 to 2019
    Wen C.
    Zhan Q.
    Fan Z.
    Zhan D.
    Zhao H.
    Wu K.
    Journal of Geo-Information Science, 2021, 23 (11) : 2055 - 2072
  • [40] A Privacy-Preserving Multi-Factor Authenticated Key Exchange Protocol with Provable Security for Cloud Computing
    Wei, Fu-Shah
    Jiang, Qi
    Zhang, Rui-Jie
    Ma, Chuan-Gui
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (04) : 907 - 921