D Wang, H Cheng, P Wang, X Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Despite three decades of intensive research efforts, it remains an open question as to what is the underlying distribution of user-generated passwords. In this paper, we make a …
Z Li, D Wang, E Morais - IEEE transactions on dependable and …, 2020 - ieeexplore.ieee.org
Password authentication is the dominant form of access control for the Web and mobile devices, and its practicality and ubiquity is unlikely to be replaced by other authentication …
This study provides an in-depth survey of quantum secure authentication and key agreement protocols, investigating the dynamic landscape of cryptographic techniques …
Abstract In a Password-Protected Secret Sharing (PPSS) scheme with parameters (t, n)(formalized by Bagherzandi et al.[2]), a user Alice stores secret information among n …
We present two provably secure password-authenticated key exchange (PAKE) protocols based on a commutative group action. To date the most important instantiation of isogeny …
K Emura - Proceedings of the 9th ACM on ASIA Public-Key …, 2022 - dl.acm.org
Public-key encryption with keyword search (PEKS) does not provide trapdoor privacy, ie, keyword information is leaked through trapdoors. To prevent this information leakage, public …
Abstract Public Key Encryption with Keyword Search (PEKS), introduced by Boneh et al. in Eurocrypt'04, allows users to search encrypted documents on an untrusted server without …
Z Li, D Wang - IEEE transactions on services computing, 2019 - ieeexplore.ieee.org
Password-based authenticated key exchange () protocol, a widely used authentication mechanism to realize secure communication, allows protocol participants to establish a high …
D Wang, P Wang - European Symposium on Research in Computer …, 2016 - Springer
Textual passwords are perhaps the most prevalent mechanism for access control over the Internet. Despite the fact that human-beings generally select passwords in a highly skewed …