International audienceHardware security tokens have now been used for several decades to store cryptographic keys. When deployed, the security of the corresponding schemes fundamentally relies on the tamper-resistance of the tokens – a very strong assumption in practice. Moreover, even secure tokens, which are expensive and cumbersome, can often be subverted.We introduce a new cryptographic primitive called Encryption schemes with Password-protected Assisted Decryption (EPAD schemes), in which a user's decryption key is shared between a user device (or token) on which no assumption is made, and an online server. The user shares a human-memorizable password with the server. To decrypt a ciphertext, the user launches, from a public computer, ...
Abstract: "We introduce a protocol for authentication between a human and a computer, where the huma...
Schemes for encrypted key exchange are designed to provide two entities communicating over a public ...
Passwords have become the most ubiquitous form of client-server authentication on the Internet nowad...
International audienceHardware security tokens have now been used for several decades to store crypt...
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety...
We propose a threshold encryption scheme with two-party decryption, where one of the keyshares may b...
Password-Authenticated Key Exchange allows users to generate a strong cryptographic key based on a s...
Recent results have shown the usefulness of tamper-proof hardware tokens as a setup assumption for b...
An important shortcoming of client-side cryptography on consumer devices is the poor protection of s...
Tamper-proof hardware has found its way into our everyday life in various forms, be it SIM cards, cr...
Highly concurrent environments, like the Internet, present new challenges towards design ofsecure cr...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...
We present protocols that allow a user Alice, knowing only her name and password, and not carrying a...
A simple theoretical framework is developed to evaluate the security and usability of eavesdropping-...
There has been much interest in password-authenticated key-exchange protocols which remain secure ev...
Abstract: "We introduce a protocol for authentication between a human and a computer, where the huma...
Schemes for encrypted key exchange are designed to provide two entities communicating over a public ...
Passwords have become the most ubiquitous form of client-server authentication on the Internet nowad...
International audienceHardware security tokens have now been used for several decades to store crypt...
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety...
We propose a threshold encryption scheme with two-party decryption, where one of the keyshares may b...
Password-Authenticated Key Exchange allows users to generate a strong cryptographic key based on a s...
Recent results have shown the usefulness of tamper-proof hardware tokens as a setup assumption for b...
An important shortcoming of client-side cryptography on consumer devices is the poor protection of s...
Tamper-proof hardware has found its way into our everyday life in various forms, be it SIM cards, cr...
Highly concurrent environments, like the Internet, present new challenges towards design ofsecure cr...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...
We present protocols that allow a user Alice, knowing only her name and password, and not carrying a...
A simple theoretical framework is developed to evaluate the security and usability of eavesdropping-...
There has been much interest in password-authenticated key-exchange protocols which remain secure ev...
Abstract: "We introduce a protocol for authentication between a human and a computer, where the huma...
Schemes for encrypted key exchange are designed to provide two entities communicating over a public ...
Passwords have become the most ubiquitous form of client-server authentication on the Internet nowad...