Published January 1, 2017
| Version v1
Conference paper
Open
Threshold Single Password Authentication
Description
Passwords are the most widely used form of online user authentication. In a traditional setup, the user, who has a human-memorable low entropy password, wants to authenticate with a login server. Unfortunately, existing solutions in this setting are either non-portable or insecure against many attacks, including phishing, man-in-the-middle, honeypot, and offline dictionary attacks. Three previous studies (Acar et al. 2013, Bicakci et al. 2011, and Jarecki et al. 2016) provide solutions secure against offline dictionary attacks by additionally employing a storage provider (either a cloud storage or a mobile device for portability). These works provide solutions where offline dictionary attacks are impossible as long as the adversary does not corrupt both the login server and the storage provider.
Files
bib-40d7087a-076a-4c09-a0ea-714a05b854bf.txt
Files
(139 Bytes)
| Name | Size | Download all |
|---|---|---|
|
md5:a810e09722dc18c3d4726b4d2685be80
|
139 Bytes | Preview Download |