Proceedings 2019 Network and Distributed System Security Symposium 2019
DOI: 10.14722/ndss.2019.23350
|View full text |Cite
|
Sign up to set email alerts
|

How to End Password Reuse on the Web

Abstract: We present a framework by which websites can coordinate to make it difficult for users to set similar passwords at these websites, in an effort to break the culture of password reuse on the web today. Though the design of such a framework is fraught with risks to users' security and privacy, we show that these risks can be effectively mitigated through careful scoping of the goals for such a framework and through principled design. At the core of our framework is a private set-membershiptest protocol that enab… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(22 citation statements)
references
References 27 publications
0
22
0
Order By: Relevance
“…To prevent users from reusing their password across web services, Wang and Reiter [45,46] propose two protocols for a group of web services to check if a user is using the same password in multiple of the participating web services. The efficacy of this protocol relies on the coordination of many web services, making it harder to deploy.…”
Section: Background and Prior Workmentioning
confidence: 99%
See 2 more Smart Citations
“…To prevent users from reusing their password across web services, Wang and Reiter [45,46] propose two protocols for a group of web services to check if a user is using the same password in multiple of the participating web services. The efficacy of this protocol relies on the coordination of many web services, making it harder to deploy.…”
Section: Background and Prior Workmentioning
confidence: 99%
“…We measure and compare the latency and bandwidth requirements for running different compromised credential checking services: MIGP (ours), GPC [41], IDB [31], WR19-Bloom [45] and WR20-Cuckoo [46]. Although WR19-Bloom [45] and WR20-Cuckoo [46] were designed to check user's passwords in multiple web services, these protocols can be easily used for checking user's leaked passwords, as well. WR19-Bloom and WR20-Cuckoo protocols rely on partial homomorphic encryption technique to build private membership test (PMT) protocols.…”
Section: Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…III; account location privacy will be discussed in Sec. V. Proofs for all propositions in this section can be found in our technical report [72].…”
Section: Securitymentioning
confidence: 99%
“…After this defect was corrected, by removing the display of the valid ticket in the error report web page, another experiment was carried out. In some cases the algorithm used to generate tickets is known by attackers because the source code for the server may be available or the attackers may be able to guess the ticket algorithm [17]. In the revised Netml system, tickets were calculated as: hexsha(username+Calendar.getInstance() .get(Calendar.DAY_OF_YEAR)) In the present case this algorithm was deliberately revealed to the attacker.…”
Section: B Second Experimentsmentioning
confidence: 99%