Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
119 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

A Review of Password-less User Authentication Schemes (2312.02845v1)

Published 5 Dec 2023 in cs.CR

Abstract: Since the demise of the password was predicted in 2004, different attempts in industry and academia have been made to create an alternative for the use of passwords in authentication, without compromising on security and user experience. This review examines password-less authentication schemes that have been proposed since after the death knell was placed on passwords in 2004. We start with a brief discussion of the requirements of authentication systems and then identify various password-less authentication proposals to date. We then evaluate the truly password-less and practical schemes using a framework that examines authentication credentials based on their impact on user experience, overall security, and ease of deployment. The findings of this review observe a difficulty in balancing security with a user experience compared to that of passwords in new password-less schemes, providing the opportunity for new applied research to leverage existing knowledge and combine technologies and techniques in innovative ways that can address this imbalance.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (18)
  1. Authentication - OWASP Cheat Sheet Series. https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html; .
  2. NIST Special Publication 800-63-3. https://pages.nist.gov/sp800-63-3.html; .
  3. Campbell M. Putting the Passe Into Passwords: How Passwordless Technologies Are Reshaping Digital Identity. Computer. 2020;53(8):89–93. doi: 10.1109/MC.2020.2997278
  4. doi: 10.1109/MC.2005.408
  5. Bhattacharyya D, Ranjan R. Biometric Authentication: A Review. Science and Technology. 2009;2(3).
  6. Gehringer E. Choosing Passwords: Security and Human Factors. In: 2002:369–373
  7. doi: 10.1145/2333112.2333114
  8. Werner S, Hoover C. Cognitive Approaches to Password Memorability – the Possible Role of Story-Based Passwords. Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 2012;56(1):1243–1247. doi: 10.1177/1071181312561220
  9. Goldwasser S, Bellare M. Lecture Notes on Cryptography. 2008.
  10. Kalra DS. A NOVEL PASSWORDLESS AUTHENTICATION SCHEME FOR SMART PHONES USING ELLIPTIC CURVE CRYPTOGRAPHY. Advances in Engineering. 2016;1.
  11. doi: 10.5121/acij.2013.4602
  12. doi: 10.1016/j.dsp.2020.102672
  13. doi: 10.1007/s11042-018-7012-3
  14. doi: 10.1186/s13635-022-00132-x
  15. Bicakci K, Uzunay Y. Is FIDO2 Passwordless Authentication a Hype or for Real?: A Position Paper. In: 2022:68–73. Comment: Published in proceedings of the 15th International Information Security and Cryptology Conference, 6 pages
  16. doi: 10.3390/app122412865
  17. doi: 10.1007/s10207-022-00642-2
  18. Rao SP, Bakas A. Authenticating Mobile Users to Public Internet Commodity Services Using SIM Technology. In: ACM 2023; Guildford United Kingdom:151–162
User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (2)
  1. Tunde Oduguwa (1 paper)
  2. Abdullahi Arabo (1 paper)
Citations (2)

Summary

We haven't generated a summary for this paper yet.