论文标题
密码实施的分散身份
Password-authenticated Decentralized Identities
论文作者
论文摘要
密码认可的身份,用户与单个服务器建立用户名 - password对,并以后将其用于身份验证,是Internet上最广泛的用户身份验证方法。尽管它们是简单,用户友好且广泛采用的,但它们提供了不安全的身份验证和位置服务器操作员作为受信任的各方,从而使他们完全控制了用户身份。为了减轻这些局限性,许多身份系统都接受了公钥加密和权力下放的概念。但是,所有这些系统都要求用户创建和管理公私按键。不幸的是,用户通常没有必需的知识和资源来正确处理其加密秘密,这可以说是许多以用户为中心的公共钥匙基础结构(PKIS)的失败。实际上,至于今天,没有最终用户PKI能够将用户验证为Web服务器的用户具有很高的采用率。 在本文中,我们提出了密码实施的分散身份(PDIDS),这是一个身份和身份验证框架,用户可以在其中注册其自我保护的用户名 - password对并将其用作通用凭证。我们的系统提供了全球名称空间,人为的用户名以及针对用户名碰撞攻击的弹性。用户的身份可用于将用户身份验证到任何服务器,而无需揭示服务器有关密码的任何内容,因此对于密码,没有脱机字典攻击。我们分析了PDID并使用现有的基础架构和工具实施。我们报告我们的实施和评估。
Password-authenticated identities, where users establish username-password pairs with individual servers and use them later on for authentication, is the most widespread user authentication method over the Internet. Although they are simple, user-friendly, and broadly adopted, they offer insecure authentication and position server operators as trusted parties, giving them full control over users' identities. To mitigate these limitations, many identity systems have embraced public-key cryptography and the concept of decentralization. All these systems, however, require users to create and manage public-private keypairs. Unfortunately, users usually do not have the required knowledge and resources to properly handle their cryptographic secrets, which arguably contributed to failures of many end-user-focused public-key infrastructures (PKIs). In fact, as for today, no end-user PKI, able to authenticate users to web servers, has a significant adoption rate. In this paper, we propose Password-authenticated Decentralized Identities (PDIDs), an identity and authentication framework where users can register their self-sovereign username-password pairs and use them as universal credentials. Our system provides global namespace, human-meaningful usernames, and resilience against username collision attacks. A user's identity can be used to authenticate the user to any server without revealing that server anything about the password, such that no offline dictionary attacks are possible against the password. We analyze PDIDs and implement it using existing infrastructures and tools. We report on our implementation and evaluation.