搜索结果: 1-15 共查到“Password”相关记录127条 . 查询时间(0.046 秒)
Separating Standard and Asymmetric Password-Authenticated Key Exchange
PAKE Password-Authenticated Key Exchange
font style='font-size:12px;'>
2019/9/23
Password-Authenticated Key Exchange (PAKE) is a method to establish cryptographic keys between two users sharing a low-entropy password. In its asymmetric version, one of the users acts as a server an...
TMPS: Ticket-Mediated Password Strengthening
password strengthening password cryptography
font style='font-size:12px;'>
2019/5/23
We introduce the notion of Ticket-Mediated Password Strengthening (TMPS), a technique for allowing users to derive keys from passwords while imposing a strict limit on the number of guesses of their p...
Password-Authenticated Public-Key Encryption
Password Authenticated Key Exchange Universal Composability Public Key Encryption
font style='font-size:12px;'>
2019/3/1
We introduce password-authenticated public-key encryption (PAPKE), a new cryptographic primitive. PAPKE enables secure end-to-end encryption between two entities without relying on a trusted third par...
PASTA: PASsword-based Threshold Authentication
passwords token-based authentication threshold cryptography
font style='font-size:12px;'>
2018/11/13
Token-based authentication is commonly used to enable a single-sign-on experience on the web, in mobile applications and on enterprise networks using a wide range of open standards and network authent...
An Isogeny-Based Password-Authenticated Key Establishment Protocol
isogeny-based cryptography password-authenticated key establishment
font style='font-size:12px;'>
2018/11/13
Password authenticated key establishment (PAKE) is a cryptographic primitive that allows two parties who share a low-entropy secret (a password) to securely establish cryptographic keys in the absence...
Your Culture is in Your Password: An Analysis of a Demographically-diverse Password Dataset
contextually relevant information non-English speaking backgrounds
font style='font-size:12px;'>
2018/11/12
A large number of studies on passwords make use of passwords leaked by attackers who compromised online services. Frequently, these leaks contain only the passwords themselves, or basic information su...
User Study on Single Password Authentication
Password authentication usability two-factor authentication
font style='font-size:12px;'>
2018/11/6
Single password authentication (SPA) schemes are introduced to overcome the challenges of traditional password authentications, which are vulnerable to offline dictionary, phishing, honeypot, and man-...
SPHINX: A Password Store that Perfectly Hides Passwords from Itself
SPHINX PAKE
font style='font-size:12px;'>
2018/7/20
Password managers (aka stores or vaults) allow a user to store and retrieve (usually high-entropy) passwords for her multiple password-protected services by interacting with a "device" serving the rol...
How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior
passwords secure computation differential privacy, heavy hitters
font style='font-size:12px;'>
2018/1/12
Bad choices of passwords were and are a pervasive problem. Most password alternatives (such as two-factor authentication) may increase cost and arguably hurt the usability of the system. This is of sp...
Two-Factor Authentication with End-to-End Password Security
password authentication two-factor authentication short authenticated string model
font style='font-size:12px;'>
2018/1/11
We present a secure two-factor authentication (TFA) scheme based on the possession by the user of a password and a crypto-capable device. Security is ``end-to-end" in the sense that the attacker can a...
Efficient Implementation of Password-Based Authenticated Key Exchange from RLWE and Post-Quantum TLS
Authenticated Key Exchange Implementation Post-quantum
font style='font-size:12px;'>
2017/12/19
Two post-quantum password-based authenticated key exchange (PAKE) protocols were proposed at CT-RSA 2017. Following this work, we give much more efficient and portable C++ implementation of these two ...
Post-Quantum Secure Remote Password Protocol from RLWE Problem
Post-quantum RLWE SRP
font style='font-size:12px;'>
2017/12/19
Secure Remote Password (SRP) protocol is an augmented Password-based Authenticated Key Exchange (PAKE) protocol based on discrete logarithm problem (DLP) with various attractive security features. Com...
A practical, perfectly secure password scheme in the bounded retrieval model
secret-key cryptography bounded retrieval model
font style='font-size:12px;'>
2017/9/25
In this paper, we present a practical password scheme due to Spilman, which is perfectly secure in the bounded retrieval model, assuming ideal hash functions. The construction is based on a hash-like ...
Zero-Knowledge Password Policy Check from Lattices
zero-knowledge password policy check set membership proof lattice-based cryptography
font style='font-size:12px;'>
2017/9/13
Passwords are ubiquitous and most commonly used to authenticate users when logging into online services. Using high entropy passwords is critical to prevent unauthorized access and password policies e...
The TypTop System: Personalized Typo-tolerant Password Checking
Password typo-tolerant password
font style='font-size:12px;'>
2017/8/30
Password checking systems traditionally allow login only if the correct password is submitted. Recent work on typo-tolerant password checking suggests that usability can be improved, with negligible s...