G Almashaqbeh - International Symposium on Cyber Security, Cryptology …, 2024 - Springer
Passwords are widely adopted for user authentication in practice, which led to the question of whether we can bootstrap a strongly-secure setting based on them. Historically, this has …
J Jiang, D Wang - IEEE Transactions on Information Forensics …, 2024 - ieeexplore.ieee.org
Searchable encryption is a powerful tool that enables secure and private searches of encrypted data. It allows users to outsource their data to cloud servers while maintaining the …
L Chen, T Qu, A Yin - Multimedia Tools and Applications, 2024 - Springer
Password-based authentication is one of the most prevailing access control mechanism. Typical password-authenticated key exchange (PAKE) protocols are single-server settings …
Universal thresholdizer (UT) was proposed by Boneh et al. in CRYPTO'18 as a general framework for thresholdizing non-threshold cryptographic primitives where a set of $ N …