scholarly journals Two factor authentication framework based on ethereum blockchain with dApp as token generation system instead of third-party on web application

2020 ◽  
Vol 6 (2) ◽  
pp. 74
Author(s):  
Marsha Chikita Intania Putri ◽  
Parman Sukarno ◽  
Aulia Arif Wardana

Authentication is a method for securing an account by verifying the user identity by inputting email with a password. Two factor authentications is an authentication system that combines the first-factor authentication with the second factor. General two factor authentication by entering an email or username with a password are similar. However, two factor authentication requires additional information that must be inputted by the user. Additional information can be in the form of tokens or one-time passwords (OTP). Two factor authentications generally still uses third-party services to generate token or OTP still have vulnerable because can attacked from tokens steal through MITM and found that the generated tokens with the same value. Therefore, we propose a two-factor authentication framework based on ethereum blockchain with dApp as token generation system. Firstly, outcome from the analysis of the system, next succeeded in creating a two-factor authentication system without using third-parties. Second, token system generate up to 3164 different tokens  in one second and has been collisions tested. Third, security method to protect token from MITM attack. The attacker unable to get access caused all the checking are done by dApp user authentication.

Author(s):  
Junade Ali

Password authentication is an essential and widespread form of user authentication on the Internet with no other authentication system matching its dominance. When a password on one website is breached, if reused, the stolen password can be used to gain access to multiple other authenticated websites. Even amongst technically educated users, the security issues surrounding password reuse are not well understood and restrictive password composition rules have been unsuccessful in reducing password reuse. In response, the US NIST have published standards outlining that, when setting passwords, authentication systems should validate that user passwords have not already been compromised or breached. We propose a mechanism to allows for clients to anonymously validate whether or not a password has been identified in a compromised database, without needing to download the entire database or send their password to a third-party service. A mechanism is proposed whereby password hash data is generalized such that it holds the k-anonymity property. An implementation is constructed to identify to what extent the data should be generalized for it to hold k-anonymity and additionally to group password hashes by their generalized anonymous value. The implementation is run on a database of over 320 million leaked passwords and the results of the anonymization process are considered.


2017 ◽  
Author(s):  
Junade Ali

Password authentication is an essential and widespread form of user authentication on the Internet with no other authentication system matching its dominance. When a password on one website is breached, if reused, the stolen password can be used to gain access to multiple other authenticated websites. Even amongst technically educated users, the security issues surrounding password reuse are not well understood and restrictive password composition rules have been unsuccessful in reducing password reuse. In response, the US NIST have published standards outlining that, when setting passwords, authentication systems should validate that user passwords have not already been compromised or breached. We propose a mechanism to allows for clients to anonymously validate whether or not a password has been identified in a compromised database, without needing to download the entire database or send their password to a third-party service. A mechanism is proposed whereby password hash data is generalized such that it holds the k-anonymity property. An implementation is constructed to identify to what extent the data should be generalized for it to hold k-anonymity and additionally to group password hashes by their generalized anonymous value. The implementation is run on a database of over 320 million leaked passwords and the results of the anonymization process are considered.


2018 ◽  
pp. 101
Author(s):  
Rafael Lara González

ResumenPese a su ubicuidad en la práctica contractual, las cláusulas de franquicia han recibido tratamiento incidental en la doctrina. La discusión sobre ellas se ha enfocado en los contratos de seguros de responsabilidad civil, y en la interpretación del artículo 76 de la Ley española de Contrato de Seguro. En este contexto se ha tratado de establecer si el asegurador puede o no oponer la cláusula de franquicia al tercero perjudicado. El presente trabajo analiza la cláusula de franquicia en la obligación principal del asegurador, su naturaleza jurídica, y examina su relación con los terceros perjudicados. La consideración principal a este respecto estará en si nos encontramos ante un seguro obligatorio o ante un seguro voluntario de responsabilidad civil. Palabras clave: Contrato de seguro; Cláusula de franquicia; Terceroperjudicado; Responsabilidad civil.AbstractDespite their ubiquity in contractual praxis, deductible clauses have received only incidental treatment in legal doctrine. Discussion on them has focused on civil liability insurance contracts, and the interpretation of article 76 of the Spanish Law of Insurance Contracts. In this context it has been attempted to establish whether the insurer can invoke the clause to oppose the injured third party's claim. This article examines the deductible clause included in the insurer's main obligation, its legal nature, and its relation to injured third parties. The main consideration in this regard will be whether the insurance contract is of a mandatory or voluntary nature.Keywords: Insurance contract; Deductible clause; Injured third party; Civil liability.


Author(s):  
Ly Tayseng

This chapter gives an overview of the law on contract formation and third party beneficiaries in Cambodia. Much of the discussion is tentative since the new Cambodian Civil Code only entered into force from 21 December 2011 and there is little case law and academic writing fleshing out its provisions. The Code owes much to the Japanese Civil Code of 1898 and, like the latter, does not have a requirement of consideration and seldom imposes formal requirements but there are a few statutory exceptions from the principle of freedom from form. For a binding contract, the agreement of the parties is required and the offer must be made with the intention to create a legally binding obligation and becomes effective once it reaches the offeree. The new Code explicitly provides that the parties to the contract may agree to confer a right arising under the contract upon a third party. This right accrues directly from their agreement; it is not required that the third party declare its intention to accept the right.


Author(s):  
Sheng-Lin JAN

This chapter discusses the position of third party beneficiaries in Taiwan law where the principle of privity of contract is well established. Article 269 of the Taiwan Civil Code confers a right on the third party to sue for performance as long as the parties have at least impliedly agreed. This should be distinguished from a ‘spurious contract’ for the benefit of third parties where there is no agreement to permit the third party to claim. Both the aggrieved party and the third party beneficiary can sue on the contract, but only for its own loss. The debtor can only set off on a counterclaim arising from its legal relationship with the third party. Where the third party coerces the debtor into the contract, the contract can be avoided, but where the third party induces the debtor to contract with the creditor by misrepresentation, the debtor can only avoid the contract if the creditor knows or ought to have known of the misrepresentation.


Author(s):  
Masami Okino

This chapter discusses the law on third party beneficiaries in Japan; mostly characterized by adherence to the German model that still bears an imprint on Japanese contract law. Thus, there is neither a doctrine of consideration nor any other justification for a general doctrine of privity, and contracts for the benefit of third parties are generally enforceable as a matter of course. Whether an enforceable right on the part of a third party is created is simply a matter of interpretation of the contract which is always made on a case-by-case analysis but there are a number of typical scenarios where the courts normally find the existence (or non-existence) of a contract for the benefit of a third party. In the recent debate on reform of Japanese contract law, wide-ranging suggestions were made for revision of the provisions on contracts for the benefit of third parties in the Japanese Civil Code. However, it turned out that reform in this area was confined to a very limited codification of established case law.


Author(s):  
Akshay Valsaraj ◽  
Ithihas Madala ◽  
Nikhil Garg ◽  
Mohit Patil ◽  
Veeky Baths

2021 ◽  
pp. 1-26
Author(s):  
Yangguang Tian ◽  
Yingjiu Li ◽  
Robert H. Deng ◽  
Binanda Sengupta ◽  
Guomin Yang

In this paper, we introduce a new construction of reusable fuzzy signature based remote user authentication that is secure against quantum computers. We investigate the reusability of fuzzy signature, and we prove that the fuzzy signature schemes provide biometrics reusability (aka. reusable fuzzy signature). We define formal security models for the proposed construction, and we prove that it achieves user authenticity and user privacy. The proposed construction ensures: 1) a user’s biometrics can be securely reused in remote user authentication; 2) a third party having access to the communication channel between a user and the authentication server cannot identify the user.


2021 ◽  
pp. 002200272199322
Author(s):  
R. Joseph Huddleston

This paper investigates how violence in self-determination conflicts influences bilateral foreign policy. I argue that a general preference for international stability causes third parties to support self-determination groups when violence reaches high levels, when they gain territorial control, and when major powers officially recognize. In these conditions, third parties perceive a stable new status quo to be nigh: unrecognized statehood. Ongoing instability encourages foreign policy that encourages the development of the de facto state, even when third parties have no intention of recognizing them as states. Importantly, I also show that targeting civilians erodes third-party support of the perpetrating side. I demonstrate these relationships using a latent variable model of international sovereignty of aspiring states, built on bilateral military, diplomatic, and economic exchange data. My model and tests provide new insight into how aspiring state actors become increasingly eligible for recognition through the tacit support of third-party states.


Sign in / Sign up

Export Citation Format

Share Document