Libing Wu, Jing Wang, Kim-Kwang Raymond Choo, Senior Member, IEEE, Debiao HeSecure Key Agreement and Key Protection for Mobile Device User Authentication • August 31st, 2022
Contract Type FiledAugust 31st, 2022Abstract—As mobile devices ownership becomes more preva- lent (e.g. a user owns multiple mobile devices), the capability to offer secure and user friendly authentication becomes increas- ingly important. While a large number of identity-based user authentication mechanisms for wireless mobile environment have been proposed. However, they are not generally designed for situations where a user’s private key and some other sensitive data can be exposed if his/her mobile device is remotely or physically controlled by an attacker. Threshold secret sharing is one of the solutions to this problem, but it is limited in the requirement that there should exist an honest third-party to hold the complete key after secret reconstruction process. Therefore, in this paper, we consider the special case that only two devices (i.e. no honest party) at the user’s side jointly perform user authentication with a server, and neither device can successfully complete the authentication process alone. Moreover