Flor
ˆ
encio, D., Herley, C., and Van Oorschot, P. C. (2014).
An administrator’s guide to internet password rese-
arch. In Proceedings of the 28th USENIX Confe-
rence on Large Installation System Administration,
LISA’14, pages 35–52, Berkeley, CA, USA. USENIX
Association.
Gennaro, R., Jarecki, S., Krawczyk, H., and Rabin, T.
(2001). Robust threshold dss signatures. Information
and Computation, 164(1):54 – 84.
Grassi, Paul A. Garcia, M. E. and Feton, J. L. (2017).
Digital identity guidelines. Technical Report 800-
63-3, National Institute of Standards and Technology
(NIST).
Grassi, P. A., Fenton, J. L., Newton, E. M., Perlner, R. A.,
Regenscheid, A. R., Burr, W. E., and Picher, J. P.
(2017). Digital identity guidelines - authentication and
lifecycle management. Technical Report 800-63b, Na-
tional Institute of Standards and Technology (NIST).
Hao, F. (2017). Schnorr Non-interactive Zero-Knowledge
Proof. RFC 8235.
Haupert, V. and Mller, T. (2016). (in)security of app-
based tan methods in online banking. University of
Erlangen-Nuremberg, Germany.
Hayikader, S., Hanis binti Abd Hadi, F. N., and Ibrahim, J.
(2016). Issues and security measures of mobile ban-
king apps. International Journal of Scientific and Re-
search Publications, 6.
ISO/IEC (2013). ISO/IEC 29115. Information technology –
Security techniques – Entity authentication assurance
framework. International standard, International Or-
ganization for Standardization.
ISO/IEC (2016). ISO/IEC COMMITTEE DRAFT 29003.
Information technology – Security techniques Iden-
tity proofing. Technical report, International Organi-
zation for Standardization.
Jøsang, A., Zomai, M. A., and Suriadi, S. (2007). Usabi-
lity and privacy in identity management architectures.
In Proceedings of the Fifth Australasian Symposium
on ACSW Frontiers - Volume 68, ACSW ’07, pages
143–152, Darlinghurst, Australia, Australia. Austra-
lian Computer Society, Inc.
Kerry, C. F., Secretary, A., and Director, C. R. (2013). Fips
pub 186-4 federal information processing standards
publication digital signature standard (dss).
Kim, J.-J. and Hong, S.-P. (2011). A method of risk asses-
sment for multi-factor authentication. JIPS, 7:187–
198.
Lenz, T. and Alber, L. (2017). Towards cross-domain eid
by using agile mobile authentication. In 2017 IEEE
Trustcom/BigDataSE/ICESS, pages 570–577.
Lenz, T. and Zwattendorfer, B. (2015). A modular and flex-
ible identity management architecture for national eid
solutions. In 11th International Conference on Web
Information Systems and Technologies, pages 321 –
331.
Lindell, Y. (2017). Fast secure two-party ecdsa signing. In
Katz, J. and Shacham, H., editors, Advances in Cryp-
tology – CRYPTO 2017, pages 613–644, Cham. Sprin-
ger International Publishing.
MacKenzie, P. and Reiter, M. K. (2004). Two-party ge-
neration of dsa signatures. International Journal of
Information Security, 2(3):218–239.
Mohammed, M. M. and Elsadig, M. (2013). A multi-
layer of multi factors authentication model for online
banking services. In 2013 International Conference
on Computing, Electrical and Electronic Engineering
(ICCEEE), pages 220–224.
Sarikhani, R. (2008). Language and american social iden-
tity.
Schnorr, C. P. (1990). Efficient identification and signatures
for smart cards. In Brassard, G., editor, Advances in
Cryptology — CRYPTO’ 89 Proceedings, pages 239–
252, New York, NY. Springer New York.
Taneski, V., Heriko, M., and Brumen, B. (2014). Password
security - No change in 35 years? In 2014 37th In-
ternational Convention on Information and Communi-
cation Technology, Electronics and Microelectronics
(MIPRO), pages 1360–1365.
Turner, S. (2010). The application/pkcs10 Media Type.
RFC 5967.
Zwattendorfer, B. (2014). Towards a privacy-preserving fe-
derated identity as a service-model.
APPENDIX
Digital Signatures
In a nutshell, a digital signature scheme uses a mes-
sage M and an asymmetric key-pair key(sk
sig
, pk
sig
)
to produce a digital signature σ by using M and the
private key sk
sig
from asymmetric key-pair. A verifier
can use the signature σ, the message M and the public
key pk
sig
from asymmetric key-pair to check the in-
tegrity (σ has been issued for M) and the authenticity
(σ was produced by the holder of the corresponding
signing key sk
sig
) of the signature.
In a more formal way, a digital signature scheme
(DSS) is a set (K, S,V ) of poly-times algorithms. The
first algorithm DSS
K
takes a security parameter k to
generate an asymmetric key-pair DSS
K
(sk
sig
, pk
sig
)
where the private key is sk
sig
and the public key is
pk
sig
. The second algorithm DSS
S
is the signing
algorithm. This signing algorithm uses a message
M ∈ {0,1}
∗
and a private key sk
sig
as input data and
outputs a signature σ = DSS
S
(sk
sig
,m). The third al-
gorithm DSS
V
is the verification algorithm. This ve-
rification algorithm uses the message M ∈ {0,1}
∗
,
a public key pk
sig
, and a signature σ as input data
and outputs a single bit b = RS
V
(σ,M, pk
sig
), b ∈
{true, f alse} that indicates if the signature σ is va-
lid for M or not. Also, in a practical implementation
the message M is not directly used as input data in
DSS
S
and DSS
V
but rather H(M), where H is a cryp-
tographic hash function.
Agile Smart-device based Multi-factor Authentication for Modern Identity Management Systems
123