Quantum-safe round-optimal password authentication for mobile devices

Z Li, D Wang, E Morais - IEEE transactions on dependable and …, 2020 - ieeexplore.ieee.org
Password authentication is the dominant form of access control for the Web and mobile
devices, and its practicality and ubiquity is unlikely to be replaced by other authentication …

Delegating authentication to edge: A decentralized authentication architecture for vehicular networks

A Yang, J Weng, K Yang, C Huang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Secure and efficient access authentication is one of the most important security
requirements for vehicular networks, but it is difficult to fulfill due to potential security attacks …

Survivable zero trust for cloud computing environments

L Ferretti, F Magnanini, M Andreolini, M Colajanni - Computers & Security, 2021 - Elsevier
The security model relying on the traditional defense of the perimeter cannot protect modern
dynamic organizations. The emerging paradigm called zero trust proposes a modern …

PROTECT: Efficient password-based threshold single-sign-on authentication for mobile users against perpetual leakage

Y Zhang, C Xu, H Li, K Yang, N Cheng… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Password-based single-sign-on authentication has been widely applied in mobile
environments. It enables an identity server to issue authentication tokens to mobile users …

Oblivious pseudorandom functions from isogenies

D Boneh, D Kogan, K Woo - … 2020: 26th International Conference on the …, 2020 - Springer
An oblivious PRF, or OPRF, is a protocol between a client and a server, where the server
has a key k for a secure pseudorandom function F, and the client has an input x for the …

Secure password-protected encryption key for deduplicated cloud storage systems

Y Zhang, C Xu, N Cheng, X Shen - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this article, we propose SPADE, an encrypted data deduplication scheme that resists
compromised key servers and frees users from the key management problem. Specifically …

How to attack and generate honeywords

D Wang, Y Zou, Q Dong, Y Song… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Honeywords are decoy passwords associated with each user account to timely detect
password leakage. The key issue lies in how to generate honeywords that are hard to be …

Healthfort: A cloud-based ehealth system with conditional forward transparency and secure provenance via blockchain

S Li, Y Zhang, C Xu, N Cheng, Z Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this paper, we propose a servers-aided password-based subsequent-key-locked
encryption mechanism to ensure the confidentiality of outsourced electronic health records …

Lightweight zero-knowledge authentication scheme for IoT embedded devices

Z Wang, J Huang, K Miao, X Lv, Y Chen, B Su, L Liu… - Computer Networks, 2023 - Elsevier
Authentication technology has been employed in a variety of Internet of Things (IoT)
applications, such as electronic medical services, smart homes, and the Internet of Vehicles …

Flexirand: Output private (distributed) vrfs and application to blockchains

A Kate, EV Mangipudi, S Maradana… - Proceedings of the 2023 …, 2023 - dl.acm.org
Web3 applications based on blockchains regularly need access to randomness that is
unbiased, unpredictable, and publicly verifiable. For Web3 gaming applications, this …