PROTECT: Efficient password-based threshold single-sign-on authentication for mobile users against perpetual leakage
Password-based single-sign-on authentication has been widely applied in mobile
environments. It enables an identity server to issue authentication tokens to mobile users …
environments. It enables an identity server to issue authentication tokens to mobile users …
Secure password-protected encryption key for deduplicated cloud storage systems
In this article, we propose SPADE, an encrypted data deduplication scheme that resists
compromised key servers and frees users from the key management problem. Specifically …
compromised key servers and frees users from the key management problem. Specifically …
Privsso: Practical single-sign-on authentication against subscription/access pattern leakage
G Gao, Y Zhang, Y Song, S Li - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Single-sign-on (SSO) authentication employs an identity provider (IdP) to provide users with
an efficient way to authenticate themselves with different service providers and has been …
an efficient way to authenticate themselves with different service providers and has been …
Threshold pake with security against compromise of all servers
We revisit the notion of threshold Password-Authenticated Key Exchange (tPAKE), and we
extend it to augmented tPAKE (atPAKE), which protects password information even in the …
extend it to augmented tPAKE (atPAKE), which protects password information even in the …
PriParkRec: Privacy-preserving decentralized parking recommendation service
Insufficient parking space and traffic congestion are important usual suspects in our urban
life. Organisation and managing available parking spaces have raised a lot of awareness …
life. Organisation and managing available parking spaces have raised a lot of awareness …
Achieving one-round password-based authenticated key exchange over lattices
Password-based authenticated key exchange () protocol, a widely used authentication
mechanism to realize secure communication, allows protocol participants to establish a high …
mechanism to realize secure communication, allows protocol participants to establish a high …
Hardening password-based credential databases
Y Song, C Xu, Y Zhang, S Li - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
We propose a protection mechanism for password-based credential databases maintained
by service providers against leakage, dubbed PCDL. In PCDL, each authentication …
by service providers against leakage, dubbed PCDL. In PCDL, each authentication …
Ab-pake: Achieving fine-grained access control and flexible authentication
M Song, D Wang - IEEE Transactions on Information Forensics …, 2024 - ieeexplore.ieee.org
Two-factor authentication provides a strong defense against account compromise. However,
traditional two-factor authentication schemes cannot provide users with much flexibility and …
traditional two-factor authentication schemes cannot provide users with much flexibility and …
Phoenix: Rebirth of a Cryptographic {Password-Hardening} Service
Password remains the most widespread means of authentication, especially on the Internet.
As such, it is the Achilles heel of many modern systems. Facebook pioneered using external …
As such, it is the Achilles heel of many modern systems. Facebook pioneered using external …
Simple {Password-Hardened} Encryption Services
Passwords and access control remain the popular choice for protecting sensitive data stored
online, despite their well-known vulnerability to brute-force attacks. A natural solution is to …
online, despite their well-known vulnerability to brute-force attacks. A natural solution is to …