Papers
Topics
Authors
Recent
Detailed Answer
Quick Answer
Concise responses based on abstracts only
Detailed Answer
Well-researched responses based on abstracts and relevant paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses
Gemini 2.5 Flash
Gemini 2.5 Flash 47 tok/s
Gemini 2.5 Pro 44 tok/s Pro
GPT-5 Medium 13 tok/s Pro
GPT-5 High 12 tok/s Pro
GPT-4o 64 tok/s Pro
Kimi K2 160 tok/s Pro
GPT OSS 120B 452 tok/s Pro
Claude Sonnet 4 36 tok/s Pro
2000 character limit reached

A Review of Password-less User Authentication Schemes (2312.02845v1)

Published 5 Dec 2023 in cs.CR

Abstract: Since the demise of the password was predicted in 2004, different attempts in industry and academia have been made to create an alternative for the use of passwords in authentication, without compromising on security and user experience. This review examines password-less authentication schemes that have been proposed since after the death knell was placed on passwords in 2004. We start with a brief discussion of the requirements of authentication systems and then identify various password-less authentication proposals to date. We then evaluate the truly password-less and practical schemes using a framework that examines authentication credentials based on their impact on user experience, overall security, and ease of deployment. The findings of this review observe a difficulty in balancing security with a user experience compared to that of passwords in new password-less schemes, providing the opportunity for new applied research to leverage existing knowledge and combine technologies and techniques in innovative ways that can address this imbalance.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (18)
  1. Authentication - OWASP Cheat Sheet Series. https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html; .
  2. NIST Special Publication 800-63-3. https://pages.nist.gov/sp800-63-3.html; .
  3. Campbell M. Putting the Passe Into Passwords: How Passwordless Technologies Are Reshaping Digital Identity. Computer. 2020;53(8):89–93. doi: 10.1109/MC.2020.2997278
  4. doi: 10.1109/MC.2005.408
  5. Bhattacharyya D, Ranjan R. Biometric Authentication: A Review. Science and Technology. 2009;2(3).
  6. Gehringer E. Choosing Passwords: Security and Human Factors. In: 2002:369–373
  7. doi: 10.1145/2333112.2333114
  8. Werner S, Hoover C. Cognitive Approaches to Password Memorability – the Possible Role of Story-Based Passwords. Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 2012;56(1):1243–1247. doi: 10.1177/1071181312561220
  9. Goldwasser S, Bellare M. Lecture Notes on Cryptography. 2008.
  10. Kalra DS. A NOVEL PASSWORDLESS AUTHENTICATION SCHEME FOR SMART PHONES USING ELLIPTIC CURVE CRYPTOGRAPHY. Advances in Engineering. 2016;1.
  11. doi: 10.5121/acij.2013.4602
  12. doi: 10.1016/j.dsp.2020.102672
  13. doi: 10.1007/s11042-018-7012-3
  14. doi: 10.1186/s13635-022-00132-x
  15. Bicakci K, Uzunay Y. Is FIDO2 Passwordless Authentication a Hype or for Real?: A Position Paper. In: 2022:68–73. Comment: Published in proceedings of the 15th International Information Security and Cryptology Conference, 6 pages
  16. doi: 10.3390/app122412865
  17. doi: 10.1007/s10207-022-00642-2
  18. Rao SP, Bakas A. Authenticating Mobile Users to Public Internet Commodity Services Using SIM Technology. In: ACM 2023; Guildford United Kingdom:151–162
Citations (2)

Summary

We haven't generated a summary for this paper yet.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

Lightbulb On Streamline Icon: https://streamlinehq.com

Continue Learning

We haven't generated follow-up questions for this paper yet.