Generalized fuzzy password-authenticated key exchange from error correcting codes

J Bootle, S Faller, J Hesse, K Hostáková… - … Conference on the …, 2023 - Springer
Abstract Fuzzy Password-Authenticated Key Exchange (fuzzy PAKE) allows cryptographic
keys to be generated from authentication data that is both fuzzy and of low entropy. The …

Two-factor authenticated key exchange from biometrics with low entropy rates

C Jiang, C Xu, Y Han, Z Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Multi-factor authenticated key exchange (AKE) enables a user to be authenticated by a
server using multiple factors and negotiate a shared session key to protect subsequent …

Highly Efficient Bidirectional Multifactor Authentication and Key Agreement for Real-Time Access to Sensor Data

A Braeken - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
This article presents an authentication and key agreement protocol for users who want to
have access to constrained sensor nodes deployed in the field, eg, doctor with healthcare …

Privacy-preserving fast three-factor authentication and key agreement for IoT-based E-health systems

L Zhang, Y Zhu, W Ren, Y Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Electronic healthcare (e-health) systems have received renewed interest, particularly in the
current COVID-19 pandemic (eg, lockdowns and changes in hospital policies due to the …

A framework for UC secure privacy preserving biometric authentication using efficient functional encryption

J Ernst, A Mitrokotsa - … Conference on Applied Cryptography and Network …, 2023 - Springer
Despite its popularity, password based authentication is susceptible to various kinds of
attacks, such as online or offline dictionary attacks. Employing biometric credentials in the …

Attacks and countermeasures on privacy-preserving biometric authentication schemes

Y Wu, J Weng, Z Wang, K Wei, J Wen… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Based on the Threshold Predicate Encryption (TPE), the biometric authentication scheme
PassBio aims to correctly authenticate genuine end-users without leaking their biometric …

Attacks on Acceleration-Based Secure Device Pairing With Automatic Visual Tracking

H Hu, Y Wu, J Weng, K Wei, Z Liu… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
In an acceleration-based Secure Device Pairing (SDP) scheme, two unauthenticated
devices continuously measure their own acceleration. If the similarity of their measurements …

BRAKE: Biometric Resilient Authenticated Key Exchange

P Bauspieß, T Silde, M Poljuha, A Tullot… - IEEE …, 2024 - ieeexplore.ieee.org
Biometric data are uniquely suited for connecting individuals to their digital identities.
Deriving cryptographic key exchange from successful biometric authentication therefore …

A Survey of Wireless Sensing Security from a Role-Based View: Victim, Weapon, and Shield

R Geng, J Wang, Y Yuan, F Zhan, T Zhang… - arXiv preprint arXiv …, 2024 - arxiv.org
Wireless sensing technology has become prevalent in healthcare, smart homes, and
autonomous driving due to its non-contact operation, penetration capabilities, and cost …

Flexible hybrid post-quantum bidirectional multi-factor authentication and key agreement framework using ECC and KEM

A Braeken - Future Generation Computer Systems, 2025 - Elsevier
Post-quantum computing becomes a real threat in the coming years, resulting in vulnerable
security protocols that rely on traditional public key algorithms. It is not evident to provide …