Quantum-safe round-optimal password authentication for mobile devices
Password authentication is the dominant form of access control for the Web and mobile
devices, and its practicality and ubiquity is unlikely to be replaced by other authentication …
devices, and its practicality and ubiquity is unlikely to be replaced by other authentication …
Delegating authentication to edge: A decentralized authentication architecture for vehicular networks
Secure and efficient access authentication is one of the most important security
requirements for vehicular networks, but it is difficult to fulfill due to potential security attacks …
requirements for vehicular networks, but it is difficult to fulfill due to potential security attacks …
Survivable zero trust for cloud computing environments
The security model relying on the traditional defense of the perimeter cannot protect modern
dynamic organizations. The emerging paradigm called zero trust proposes a modern …
dynamic organizations. The emerging paradigm called zero trust proposes a modern …
PROTECT: Efficient password-based threshold single-sign-on authentication for mobile users against perpetual leakage
Password-based single-sign-on authentication has been widely applied in mobile
environments. It enables an identity server to issue authentication tokens to mobile users …
environments. It enables an identity server to issue authentication tokens to mobile users …
Oblivious pseudorandom functions from isogenies
An oblivious PRF, or OPRF, is a protocol between a client and a server, where the server
has a key k for a secure pseudorandom function F, and the client has an input x for the …
has a key k for a secure pseudorandom function F, and the client has an input x for the …
Secure password-protected encryption key for deduplicated cloud storage systems
In this article, we propose SPADE, an encrypted data deduplication scheme that resists
compromised key servers and frees users from the key management problem. Specifically …
compromised key servers and frees users from the key management problem. Specifically …
How to attack and generate honeywords
Honeywords are decoy passwords associated with each user account to timely detect
password leakage. The key issue lies in how to generate honeywords that are hard to be …
password leakage. The key issue lies in how to generate honeywords that are hard to be …
Healthfort: A cloud-based ehealth system with conditional forward transparency and secure provenance via blockchain
In this paper, we propose a servers-aided password-based subsequent-key-locked
encryption mechanism to ensure the confidentiality of outsourced electronic health records …
encryption mechanism to ensure the confidentiality of outsourced electronic health records …
Lightweight zero-knowledge authentication scheme for IoT embedded devices
Z Wang, J Huang, K Miao, X Lv, Y Chen, B Su, L Liu… - Computer Networks, 2023 - Elsevier
Authentication technology has been employed in a variety of Internet of Things (IoT)
applications, such as electronic medical services, smart homes, and the Internet of Vehicles …
applications, such as electronic medical services, smart homes, and the Internet of Vehicles …
Flexirand: Output private (distributed) vrfs and application to blockchains
A Kate, EV Mangipudi, S Maradana… - Proceedings of the 2023 …, 2023 - dl.acm.org
Web3 applications based on blockchains regularly need access to randomness that is
unbiased, unpredictable, and publicly verifiable. For Web3 gaming applications, this …
unbiased, unpredictable, and publicly verifiable. For Web3 gaming applications, this …