Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Brigham Young University

Authentication

2010

Articles 1 - 1 of 1

Full-Text Articles in Physical Sciences and Mathematics

Convenient Decentralized Authentication Using Passwords, Timothy W. Van Der Horst Mar 2010

Convenient Decentralized Authentication Using Passwords, Timothy W. Van Der Horst

Theses and Dissertations

Passwords are a very convenient way to authenticate. In terms of simplicity and portability they are very difficult to match. Nevertheless, current password-based login mechanisms are vulnerable to phishing attacks and typically require users to create and manage a new password for each of their accounts. This research investigates the potential for indirect/decentralized approaches to improve password-based authentication. Adoption of a decentralized authentication mechanism requires the agreement between users and service providers on a trusted third party that vouches for users' identities. Email providers are the de facto trusted third parties on the Internet. Proof of email address ownership is …