Quantum2FA: Efficient quantum-resistant two-factor authentication scheme for mobile devices

Q Wang, D Wang, C Cheng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Smart-card based password authentication has been the most widely used two-factor
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …

Zipf's law in passwords

D Wang, H Cheng, P Wang, X Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …

Quantum-safe round-optimal password authentication for mobile devices

Z Li, D Wang, E Morais - IEEE transactions on dependable and …, 2020 - ieeexplore.ieee.org
Password authentication is the dominant form of access control for the Web and mobile
devices, and its practicality and ubiquity is unlikely to be replaced by other authentication …

Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges

PR Babu, SAP Kumar, AG Reddy, AK Das - Computer Science Review, 2024 - Elsevier
This study provides an in-depth survey of quantum secure authentication and key
agreement protocols, investigating the dynamic landscape of cryptographic techniques …

Round-optimal password-protected secret sharing and T-PAKE in the password-only model

S Jarecki, A Kiayias, H Krawczyk - … on the Theory and Application of …, 2014 - Springer
Abstract In a Password-Protected Secret Sharing (PPSS) scheme with parameters (t,
n)(formalized by Bagherzandi et al.[2]), a user Alice stores secret information among n …

Password-authenticated key exchange from group actions

M Abdalla, T Eisenhofer, E Kiltz, S Kunzweiler… - Annual International …, 2022 - Springer
We present two provably secure password-authenticated key exchange (PAKE) protocols
based on a commutative group action. To date the most important instantiation of isogeny …

Generic construction of public-key authenticated encryption with keyword search revisited: Stronger security and efficient construction

K Emura - Proceedings of the 9th ACM on ASIA Public-Key …, 2022 - dl.acm.org
Public-key encryption with keyword search (PEKS) does not provide trapdoor privacy, ie,
keyword information is leaked through trapdoors. To prevent this information leakage, public …

A new general framework for secure public key encryption with keyword search

R Chen, Y Mu, G Yang, F Guo, X Wang - … , QLD, Australia, June 29--July 1 …, 2015 - Springer
Abstract Public Key Encryption with Keyword Search (PEKS), introduced by Boneh et al. in
Eurocrypt'04, allows users to search encrypted documents on an untrusted server without …

Achieving one-round password-based authenticated key exchange over lattices

Z Li, D Wang - IEEE transactions on services computing, 2019 - ieeexplore.ieee.org
Password-based authenticated key exchange () protocol, a widely used authentication
mechanism to realize secure communication, allows protocol participants to establish a high …

On the implications of Zipf's law in passwords

D Wang, P Wang - European Symposium on Research in Computer …, 2016 - Springer
Textual passwords are perhaps the most prevalent mechanism for access control over the
Internet. Despite the fact that human-beings generally select passwords in a highly skewed …