Privacy-preserving compromised credential checking protocol for account protection

Xiaopeng Yu,Dianhua Tang, Zhen Zhao,Wei Zhao

COMPUTER STANDARDS & INTERFACES(2024)

引用 0|浏览2
暂无评分
摘要
Hundreds of millions of accounts are sold on the Dark Web as a result of hacking. These stolen accounts can be used to maliciously log into the victim's application, which is also known as credential stuffing attacks. Recently, to resist these attacks, several compromised credential checking (C3) services have been deployed to provide users with APIs to check whether their accounts have been exposed. However, these C3 services provide the security at the cost of high latency and bandwidth. There is also the problem implicitly trusting the server to properly handle the hash prefixes containing passwords. To solve these problems, we present an efficient C3 protocol for account protection, which enables a client to check whether its account appears in a database storing the compromised credentials, without disclosing the queried account to the server. Compared to existing C3 services, the proposed C3 protocol has 10 similar to 20x and 17.8 similar to 20.7% improvement in computational time for both the client and server during the online phase, respectively, while maintaining the same computational time for server during the preprocessing phase. Meanwhile, the proposed C3 protocol improves the communication cost of client-to-server by 17 similar to 33x while maintaining the same communication cost of server-to-client.
更多
查看译文
关键词
Information security,Cryptography,Privacy,Account protection,Compromised credential checking,Credential stuffing attacks
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要