Quantum2FA: Efficient quantum-resistant two-factor authentication scheme for mobile devices

Q Wang, D Wang, C Cheng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Smart-card based password authentication has been the most widely used two-factor
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …

Quantum-safe round-optimal password authentication for mobile devices

Z Li, D Wang, E Morais - IEEE transactions on dependable and …, 2020 - ieeexplore.ieee.org
Password authentication is the dominant form of access control for the Web and mobile
devices, and its practicality and ubiquity is unlikely to be replaced by other authentication …

Randomized half-ideal cipher on groups with applications to UC (a) PAKE

BFD Santos, Y Gu, S Jarecki - … International Conference on the Theory and …, 2023 - Springer
Abstract An Ideal Cipher (IC) is a cipher where each key defines a random permutation on
the domain. Ideal Cipher on a group has many attractive applications, eg, the Encrypted Key …

Achieving one-round password-based authenticated key exchange over lattices

Z Li, D Wang - IEEE transactions on services computing, 2019 - ieeexplore.ieee.org
Password-based authenticated key exchange () protocol, a widely used authentication
mechanism to realize secure communication, allows protocol participants to establish a high …

GeT a CAKE: Ge neric T ransformations from K ey Encaspulation Mechanisms to Password A uthenticated K ey E xchanges

H Beguinet, C Chevalier, D Pointcheval… - … Conference on Applied …, 2023 - Springer
Abstract Password Authenticated Key Exchange (PAKE) have become a key building block
in many security products as they provide interesting efficiency/security trade-offs. Indeed, a …

Hash proof systems over lattices revisited

F Benhamouda, O Blazy, L Ducas, W Quach - … International Workshop on …, 2018 - Springer
Abstract Hash Proof Systems or Smooth Projective Hash Functions (SPHFs) are a form of
implicit arguments introduced by Cramer and Shoup at Eurocrypt'02. They have found many …

A generic construction of tightly secure password-based authenticated key exchange

J Pan, R Zeng - International Conference on the Theory and …, 2023 - Springer
We propose a generic construction of password-based authenticated key exchange (PAKE)
from key encapsulation mechanisms (KEM). Assuming that the KEM is oneway secure …

Multi-theorem preprocessing NIZKs from lattices

S Kim, DJ Wu - Journal of Cryptology, 2020 - Springer
Non-interactive zero-knowledge (NIZK) proofs are fundamental to modern cryptography.
Numerous NIZK constructions are known in both the random oracle and the common …

Quantum-Safe Lattice-Based Certificateless Anonymous Authenticated Key Agreement for Internet of Things

G Wei, K Fan, K Zhang, H Wang, H Li… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
In recent years, the Internet of Things (IoT) has gained immense popularity in various
aspects of work, learning, and daily life. Within the IoT realm, there is a growing concern …

Two-round PAKE protocol over lattices without NIZK

Z Li, D Wang - International Conference on Information Security and …, 2018 - Springer
Reducing the number of communication rounds of Password-based Authenticated Key
Exchange (PAKE PAKE) protocols is of great practical significance. At PKC'15, Abdalla et al …