Next Article in Journal
Equivalence of Informations Characterizes Bregman Divergences
Previous Article in Journal
Comparative Analysis of Robust Entanglement Generation in Engineered XX Spin Chains
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Post-Quantum Secure Multi-Factor Authentication Protocol for Multi-Server Architecture

School of Computer Science and Technology, Donghua University, Shanghai 201620, China
*
Author to whom correspondence should be addressed.
Entropy 2025, 27(7), 765; https://doi.org/10.3390/e27070765
Submission received: 24 May 2025 / Revised: 28 June 2025 / Accepted: 7 July 2025 / Published: 18 July 2025

Abstract

The multi-factor authentication (MFA) protocol requires users to provide a combination of a password, a smart card and biometric data as verification factors to gain access to the services they need. In a single-server MFA system, users accessing multiple distinct servers must register separately for each server, manage multiple smart cards, and remember numerous passwords. In contrast, an MFA system designed for multi-server architecture allows users to register once at a registration center (RC) and then access all associated servers with a single smart card and one password. MFA with an offline RC addresses the computational bottleneck and single-point failure issues associated with the RC. In this paper, we propose a post-quantum secure MFA protocol for a multi-server architecture with an offline RC. Our MFA protocol utilizes the post-quantum secure Kyber key encapsulation mechanism and an information-theoretically secure fuzzy extractor as its building blocks. We formally prove the post-quantum semantic security of our MFA protocol under the real or random (ROR) model in the random oracle paradigm. Compared to related protocols, our protocol achieves higher efficiency and maintains reasonable communication overhead.
Keywords: multi-factor authentication; fuzzy extractor; real or random model; post-quantum security; key encapsulation mechanism; lattice-based cryptography multi-factor authentication; fuzzy extractor; real or random model; post-quantum security; key encapsulation mechanism; lattice-based cryptography

Share and Cite

MDPI and ACS Style

Wen, Y.; Su, Y.; Li, W. Post-Quantum Secure Multi-Factor Authentication Protocol for Multi-Server Architecture. Entropy 2025, 27, 765. https://doi.org/10.3390/e27070765

AMA Style

Wen Y, Su Y, Li W. Post-Quantum Secure Multi-Factor Authentication Protocol for Multi-Server Architecture. Entropy. 2025; 27(7):765. https://doi.org/10.3390/e27070765

Chicago/Turabian Style

Wen, Yunhua, Yandong Su, and Wei Li. 2025. "Post-Quantum Secure Multi-Factor Authentication Protocol for Multi-Server Architecture" Entropy 27, no. 7: 765. https://doi.org/10.3390/e27070765

APA Style

Wen, Y., Su, Y., & Li, W. (2025). Post-Quantum Secure Multi-Factor Authentication Protocol for Multi-Server Architecture. Entropy, 27(7), 765. https://doi.org/10.3390/e27070765

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop