Threshold password-authenticated secret sharing (TPASS) protocols allow a client to secret-share a secret s among n servers and protect it with a password pw, so that the client can later recover s from any subset of t of the servers using the password pw, but so that no coalition smaller than t learns anything about s or can mount an offline dictionary attack on the password pw. Some TPASS protocols have appeared in the literature recently. The protocol by Bagherzandi et al. (CCS 2011) leaks the password if a client mistakenly executes the protocol with malicious servers. The first t-out-of-n TPASS protocol for any n>tthat does not suffer from this shortcoming was given by Camenisch et al. (CRYPTO 2014). This protocol, proved to be secure in t...
AbstractWe present two protocols for threshold password authenticated key exchange. In this model fo...
A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) wh...
There has been renewed attention to threshold signature in recent years as the threshold version of ...
Threshold password-authenticated secret sharing (TPASS) protocols allow a client to secret-share a s...
Threshold password-authenticated secret sharing (TPASS) protocols allow a client to distribute a sec...
Threshold password-authenticated secret sharing (TPASS) protocols allow a client to distribute a sec...
Passwords are inherently vulnerable to dictionary attacks, but are quite secure if guessing attempts...
Abstract. Protecting user data entails providing authenticated users access to their data. The most ...
We present two protocols for threshold password authenticated key exchange. In this model for passwo...
AbstractWe present two protocols for threshold password authenticated key exchange. In this model fo...
We present a new protocol for the verifiable redistribution of secrets from (m,n) to (m # ,n # ) acc...
[[abstract]]In this paper we propose a notion, the (t, n)-threshold agreement certificate. The (t, n...
Password-authenticated secret sharing (PASS) schemes, first introduced by Bagherzandi et al. at CCS ...
Passwords have become the most ubiquitous form of client-server authentication on the Internet nowad...
Passwords have become the most ubiquitous form of client-server authentication on the Internet nowad...
AbstractWe present two protocols for threshold password authenticated key exchange. In this model fo...
A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) wh...
There has been renewed attention to threshold signature in recent years as the threshold version of ...
Threshold password-authenticated secret sharing (TPASS) protocols allow a client to secret-share a s...
Threshold password-authenticated secret sharing (TPASS) protocols allow a client to distribute a sec...
Threshold password-authenticated secret sharing (TPASS) protocols allow a client to distribute a sec...
Passwords are inherently vulnerable to dictionary attacks, but are quite secure if guessing attempts...
Abstract. Protecting user data entails providing authenticated users access to their data. The most ...
We present two protocols for threshold password authenticated key exchange. In this model for passwo...
AbstractWe present two protocols for threshold password authenticated key exchange. In this model fo...
We present a new protocol for the verifiable redistribution of secrets from (m,n) to (m # ,n # ) acc...
[[abstract]]In this paper we propose a notion, the (t, n)-threshold agreement certificate. The (t, n...
Password-authenticated secret sharing (PASS) schemes, first introduced by Bagherzandi et al. at CCS ...
Passwords have become the most ubiquitous form of client-server authentication on the Internet nowad...
Passwords have become the most ubiquitous form of client-server authentication on the Internet nowad...
AbstractWe present two protocols for threshold password authenticated key exchange. In this model fo...
A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) wh...
There has been renewed attention to threshold signature in recent years as the threshold version of ...