Filters








10,985 Hits in 5.2 sec

Simple Password-Based Encrypted Key Exchange Protocols [chapter]

Michel Abdalla, David Pointcheval
<span title="">2005</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In this paper, we present two simple password-based encrypted key exchange protocols based on that of Bellovin and Merritt.  ...  Password-based encrypted key exchange are protocols that are designed to provide pair of users communicating over an unreliable channel with a secure session key even when the secret key or password shared  ...  password-based encrypted key exchange protocols.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-30574-3_14">doi:10.1007/978-3-540-30574-3_14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/boat3c7qjjhedg2nnappe6qdfq">fatcat:boat3c7qjjhedg2nnappe6qdfq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150110175706/http://www.di.ens.fr/~abdalla/papers/AbPo05a-letter.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/68/10/681035c5ac977c9b5c6a54d2d77c51b3db5af768.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-30574-3_14"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

An Implementation of Picpass Algorithm for the Solution of Key Exchange Problem

Er. Krishan Kumar, Nidhi Singla
<span title="2021-11-05">2021</span> <i title="Technoscience Academy"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cwo66igunvdiplkdqwpqsgzpem" style="color: black;">International Journal of Scientific Research in Computer Science Engineering and Information Technology</a> </i> &nbsp;
In this, a PicPass Protocol i.e. picture is used as a password to make an agreement between two parties.  ...  So in this dissertation, a picture is used as a password to authenticate key exchange is that gives practical solution against offline dictionary attacks only by using both private and public key cryptography  ...  Seo and Sweeney (Seo and Sweeny 1999) proposed a simple authenticated key agreement protocol that is based on a pre-shared password method and modifies the Diffie-Hellman scheme to provide user authentication  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.32628/cseit217621">doi:10.32628/cseit217621</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hv6ngvguqnaddkqwz67p7yx6um">fatcat:hv6ngvguqnaddkqwz67p7yx6um</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220201055846/https://ijsrcseit.com/paper/CSEIT217621.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/80/ee/80ee768f100f4bee3f0d3f1a19f3e73a6966490c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.32628/cseit217621"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Offline dictionary attack on a universally composable three-party password-based key exchange protocol

Wei Yuan, Liang Hu, Hongtu Li, Jianfeng Chu
<span title="">2011</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5i4djr4tgnbobnjegejzpw7nny" style="color: black;">Procedia Engineering</a> </i> &nbsp;
Password-based key exchange protocols allow parties to share a secret key in an authentic manner based on an easily memorizable password.  ...  Recently, Deng et al. proposed a three-party password-based key exchange protocol in the universal composable framework in China Communications, where two users, each one of whom shares a human-memorable  ...  s password-based key exchange protocol suffers from offline dictionary attack.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.proeng.2011.08.315">doi:10.1016/j.proeng.2011.08.315</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/a2en5l4lmjavjasdn27wtht2ge">fatcat:a2en5l4lmjavjasdn27wtht2ge</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190418231023/https://core.ac.uk/download/pdf/81103624.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fa/1a/fa1a83e47303a3f997a2e81e1b0d639593b253aa.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.proeng.2011.08.315"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> elsevier.com </button> </a>

AuthStore: Password-based Authentication and Encrypted Data Storage in Untrusted Environments [article]

Clemens Zeidler, Muhammad Rizwan Asghar
<span title="2018-05-14">2018</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
We present a compact password-authenticated key exchange protocol (CompactPAKE) that integrates the retrieval of password stretching parameters.  ...  Passwords are widely used for client to server authentication as well as for encrypting data stored in untrusted environments, such as cloud storage.  ...  There are many password-based authentication protocols [20] , [21] , [22] but none of them assume the exchange of key stretching parameters.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1805.05033v1">arXiv:1805.05033v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bapnnudadjfyxmcg2raznm5toa">fatcat:bapnnudadjfyxmcg2raznm5toa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200930195837/https://arxiv.org/pdf/1805.05033v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7e/4c/7e4c355e474954442d94da72ec08b2f74cb3bac0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1805.05033v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Picpass Algorithm for Solution of Key Exchange Problem in Symmetric and Asymmetric Key Cryptography

Anchal Goyal, Deepinder Kaur
<span title="2021-12-05">2021</span> <i title="Technoscience Academy"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cwo66igunvdiplkdqwpqsgzpem" style="color: black;">International Journal of Scientific Research in Computer Science Engineering and Information Technology</a> </i> &nbsp;
In this, a PicPass Protocol i.e. picture is used as a password to make an agreement between two parties.  ...  So in this dissertation, a picture is used as a password to authenticate key exchange is that gives practical solution against offline dictionary attacks only by using both private and public key cryptography  ...  Seo and Sweeney Key Agreement Protocol Seo and Sweeney proposed a simple authenticated key agreement protocol that Alice and Bob (two users) share a common password P before the protocol begins and uses  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.32628/cseit217664">doi:10.32628/cseit217664</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/px5dlteffvffzdnh4vwxdw7s3u">fatcat:px5dlteffvffzdnh4vwxdw7s3u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220131083527/https://ijsrcseit.com/paper/CSEIT217664.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/be/f6/bef6cef67dad2a19c1d2190568993b9130d7fdab.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.32628/cseit217664"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Enhanced Authentication Scheme using Password Integrated Challenge Response Protocol

Nitesh Rastogi, Avinav Pathak, Shweta Rastogi
<span title="2013-01-18">2013</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
The protocols are used here for initializing the valid keys and passwords for communicating with the devices.  ...  Authentication is a process by which both the sender and receiver check and identify the validcommunicative partners prior to initialization of message exchange.  ...  The password base protocol problem was first studies by Gong et al. Another very important work was done by Bellovin and Merritt [3] in encrypted key exchange (EKE) in the year 1993.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/10107-4764">doi:10.5120/10107-4764</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ahktluf76vcnnhdll6pml367am">fatcat:ahktluf76vcnnhdll6pml367am</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170814083208/http://research.ijcaonline.org/volume62/number9/pxc3884764.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4a/d1/4ad1de254744478bc1c9a4b10b4330b5f26e45bb.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/10107-4764"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Solution to Security and Secrecy in Cloud Environment using PAKE Protocol - A Bibliographic Survey

Anitha KumariK, Sudha Sadasivam G, Madhumitha R
<span title="2014-06-18">2014</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
This paper presents an extensive survey of various Password Authenticated Key Exchange (PAKE) protocols available in the literature to eliminate the drawbacks in the current authentication procedure of  ...  Adopting a cloud computing paradigm may have positive as well as negative effects on authenticating a user and exchanging the data.  ...  Encrypted Key Exchange The first successful password-authenticated key exchange method was encrypted key exchange (EKE) methods [7] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/16767-6334">doi:10.5120/16767-6334</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mirbmvi665cwfcv3cxsmhzogdy">fatcat:mirbmvi665cwfcv3cxsmhzogdy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721084841/https://research.ijcaonline.org/volume96/number2/pxc3896334.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cb/b9/cbb972966570f3546a8335472311869675e8d2b2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/16767-6334"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Password-Only Authenticated Key Exchange Using Distributed Server
English

N Narmadha, S Rajathi
<span title="2014-03-25">2014</span> <i title="Seventh Sense Research Group Journals"> International Journal of Computer Trends and Technology </i> &nbsp;
Authentication using Passwordauthenticated key exchange using distributed server (PAKEUDE) is done where a cryptographic key -exchange of messages.  ...  Database of all passwords to authenticate clients are stored in a distributed server.  ...  Bellovin and Merritt were the first to consider authentication based on password only, and introduced a set of so-called "encrypted key exchange" protocols, where the password is used as a secret key to  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14445/22312803/ijctt-v9p158">doi:10.14445/22312803/ijctt-v9p158</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ysc42tgfe5dczhcmvoryl3fhwi">fatcat:ysc42tgfe5dczhcmvoryl3fhwi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150324042648/http://ijcttjournal.org/Volume9/number-6/IJCTT-V9P158.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/45/ef/45efd36a36e3aa8137f281b70099dc81a9db0af0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14445/22312803/ijctt-v9p158"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Secure password-based cipher suite for TLS

Michael Steiner, Peter Buhler, Thomas Eirich, Michael Waidner
<span title="2001-05-01">2001</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/trn6le535rfr5ma6j7pf3fegae" style="color: black;">ACM Transactions on Privacy and Security</a> </i> &nbsp;
However, the adoption of password-based key-exchange protocols can overcome some of these problems.  ...  The resulting protocol provides secure mutual authentication and key establishment over an insecure channel. It does not have to resort to a PKI or keys and certificates stored on the users computer.  ...  Below are some more detailed explanations why we rejected other protocols. 5.5.1 SPEKE. An alternative protocol is the Simple Password Encrypted Key Exchange (SPEKE) [Jablon 1996 ].  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/501963.501965">doi:10.1145/501963.501965</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6u52lfbgtndshn2zvnkre6y74q">fatcat:6u52lfbgtndshn2zvnkre6y74q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809072555/http://user.informatik.uni-goettingen.de/~fu/ptls/p134-steiner.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2d/41/2d4156e3d48fadfe73af988a7f68f3dc1dd71cee.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/501963.501965"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Efficient Two-Server Password-Only Authenticated Key Exchange

P.B. Prof. Kumbhar, ,Dr.* Vyankatesh S. Kulkarni
<span title="2016-02-20">2016</span> <i title="Zenodo"> Zenodo </i> &nbsp;
The proposed system proposes two servers,using password-authent icated key exchange(PAKE).  ...  Password-authenticated key exchange (PAKE) is place d in between client and a main server,which is used to share a password and authentication of pass word and in parallel establish a cryptographic key  ...  The password in this case, is nothing but is a secret key to encrypt random number for exchange of key.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.1466594">doi:10.5281/zenodo.1466594</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pz7jqt5g6bb77eykezgjqmjvgu">fatcat:pz7jqt5g6bb77eykezgjqmjvgu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201226030531/https://zenodo.org/record/1466594/files/1456597432_Volume%203%20Issue%202.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/93/00/93008943a7b42269b432c366bbc15dba433f00bb.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.1466594"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

A Non-Exchanged Password Scheme for Password-Based Authentication in Client-Server Systems

Shakir M. Hussain, Hussein Al-Bahadil
<span title="2008-12-01">2008</span> <i title="Science Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/myyqjkgwizb57p75zpb2nhqvpe" style="color: black;">American Journal of Applied Sciences</a> </i> &nbsp;
The second phase utilizes P to derive a Key (K) using the Password-Based Key Derivation (PBKD) algorithm. The third phase uses P and K to generate the exchanged DS.  ...  The password-based authentication is widely used in client-server systems. This research presents a non-exchanged password scheme for password-based authentication.  ...  Simple Password Exponential Key Exchange (SPEKE) [5] • The secret public key methods [6] • Open Key Exchange (OKE) [7] They all have their own drawbacks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3844/ajassp.2008.1630.1634">doi:10.3844/ajassp.2008.1630.1634</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ssb62wwipvgnnn7opxrtuj5qru">fatcat:ssb62wwipvgnnn7opxrtuj5qru</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170813210909/http://thescipub.com/PDF/ajassp.2008.1630.1634.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f4/a5/f4a54f2308629900db45fd6ffff3517d50b13214.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3844/ajassp.2008.1630.1634"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Network Security System with Optimized Randomized Multiple Key Exchange Algorithm

<span title="2020-01-10">2020</span> <i title="Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cj3bm7tgcffurfop7xzswxuks4" style="color: black;">VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE</a> </i> &nbsp;
The proposed three algorithms namely 1) Modified Simple Password Key Exchange Scheme 2) Modified Diffie-Hellman Key exchange Scheme 3) Modified Elliptic Curve Scheme are meant to provide shared secret  ...  key for authentication process.  ...  The Figure 3 shows the modified simple password key exchange, which provides authentication & key establishment over an insecure channel.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijitee.b6849.019320">doi:10.35940/ijitee.b6849.019320</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hcibov3rnng2xasgc5iq7g3zku">fatcat:hcibov3rnng2xasgc5iq7g3zku</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220225100336/https://www.ijitee.org/wp-content/uploads/papers/v9i3/B6849129219.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7d/18/7d18418cdbbecd644c02bf195c74360fca5ee9c2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijitee.b6849.019320"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

ZERO KNOWLEDGE PASSWORD AUTHENTICATION PROTOCOL

NIVEDITA DATTA
<span title="">2012</span> <i title="Institute for Project Management Pvt. Ltd"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rem4fi3kebht7gtaaobkyay4iy" style="color: black;">International Journal of Communication Networks and Security</a> </i> &nbsp;
This paper presents a simple protocol based on zero knowledge proof by which the user can prove to the authentication server that he has the password without having to send the password to the server as  ...  Also, another version of this protocol has been proposed which makes use of public key cryptography thus adding one more level of security to the protocol and enabling mutual authentication between the  ...  This protocol is based on challenge-response model and makes use of singleuse keys to provide more security.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.47893/ijcns.2012.1047">doi:10.47893/ijcns.2012.1047</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5guirvydczgzppc5gm2swuukca">fatcat:5guirvydczgzppc5gm2swuukca</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210117211433/https://www.interscience.in/cgi/viewcontent.cgi?article=1047&amp;context=ijcns" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/95/e3/95e3c785e9fdf0c070a6b6b53b4de22cd743ea2d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.47893/ijcns.2012.1047"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Zero Knowledge Password Authentication Protocol [chapter]

Nivedita Datta
<span title="">2013</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kax3wwzwmncwhi472pxbzqsjja" style="color: black;">Advances in Intelligent Systems and Computing</a> </i> &nbsp;
This paper presents a simple protocol based on zero knowledge proof by which the user can prove to the authentication server that he has the password without having to send the password to the server as  ...  Also, another version of this protocol has been proposed which makes use of public key cryptography thus adding one more level of security to the protocol and enabling mutual authentication between the  ...  This protocol is based on challenge-response model and makes use of singleuse keys to provide more security.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-35461-8_7">doi:10.1007/978-3-642-35461-8_7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kjn3sbxk7zbl3i3xmrdkht4s6q">fatcat:kjn3sbxk7zbl3i3xmrdkht4s6q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809063951/http://www.idc-online.com/technical_references/pdfs/data_communications/ZERO%20KNOWLEDGE.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/06/c7/06c76f0fc9766eb62ec1b81611141a9258115a80.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-35461-8_7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

On the post-quantum security of encrypted key exchange protocols [article]

Li Yang, Rui-Rui Zhou
<span title="2013-06-21">2013</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
We investigate the post-quantum security of the encrypted key exchange(EKE) protocols based on some basic physical parameters of ion-trap quantum computer, and show that the EKE protocol with a 40-bit  ...  We present a password encrypted no-key protocol to resist middle-man attack, and prove that it is also with the post-quantum security.  ...  The basic idea The encrypted key exchange (EKE) protocol integrates the asymmetric and symmetric encryption algorithms to ensure two parties sharing a secret key [1] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1305.5640v3">arXiv:1305.5640v3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/edyhrgdwj5fftkwwzzccek74xu">fatcat:edyhrgdwj5fftkwwzzccek74xu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191017010925/https://arxiv.org/pdf/1305.5640v3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ef/92/ef92ef70d8d96c50154f77f00068d3dc2f304908.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1305.5640v3" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 10,985 results