PROTECT: Efficient password-based threshold single-sign-on authentication for mobile users against perpetual leakage

Y Zhang, C Xu, H Li, K Yang, N Cheng… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Password-based single-sign-on authentication has been widely applied in mobile
environments. It enables an identity server to issue authentication tokens to mobile users …

Secure password-protected encryption key for deduplicated cloud storage systems

Y Zhang, C Xu, N Cheng, X Shen - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this article, we propose SPADE, an encrypted data deduplication scheme that resists
compromised key servers and frees users from the key management problem. Specifically …

Privsso: Practical single-sign-on authentication against subscription/access pattern leakage

G Gao, Y Zhang, Y Song, S Li - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Single-sign-on (SSO) authentication employs an identity provider (IdP) to provide users with
an efficient way to authenticate themselves with different service providers and has been …

Threshold pake with security against compromise of all servers

Y Gu, S Jarecki, P Kedzior, P Nazarian, J Xu - International Conference on …, 2025 - Springer
We revisit the notion of threshold Password-Authenticated Key Exchange (tPAKE), and we
extend it to augmented tPAKE (atPAKE), which protects password information even in the …

PriParkRec: Privacy-preserving decentralized parking recommendation service

Z Li, M Alazab, S Garg… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Insufficient parking space and traffic congestion are important usual suspects in our urban
life. Organisation and managing available parking spaces have raised a lot of awareness …

Achieving one-round password-based authenticated key exchange over lattices

Z Li, D Wang - IEEE transactions on services computing, 2019 - ieeexplore.ieee.org
Password-based authenticated key exchange () protocol, a widely used authentication
mechanism to realize secure communication, allows protocol participants to establish a high …

Hardening password-based credential databases

Y Song, C Xu, Y Zhang, S Li - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
We propose a protection mechanism for password-based credential databases maintained
by service providers against leakage, dubbed PCDL. In PCDL, each authentication …

Ab-pake: Achieving fine-grained access control and flexible authentication

M Song, D Wang - IEEE Transactions on Information Forensics …, 2024 - ieeexplore.ieee.org
Two-factor authentication provides a strong defense against account compromise. However,
traditional two-factor authentication schemes cannot provide users with much flexibility and …

Phoenix: Rebirth of a Cryptographic {Password-Hardening} Service

RWF Lai, C Egger, D Schröder… - 26th USENIX Security …, 2017 - usenix.org
Password remains the most widespread means of authentication, especially on the Internet.
As such, it is the Achilles heel of many modern systems. Facebook pioneered using external …

Simple {Password-Hardened} Encryption Services

RWF Lai, C Egger, M Reinert, SSM Chow… - 27th USENIX Security …, 2018 - usenix.org
Passwords and access control remain the popular choice for protecting sensitive data stored
online, despite their well-known vulnerability to brute-force attacks. A natural solution is to …