2017
DOI: 10.7287/peerj.preprints.3322
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Mechanism for the prevention of password reuse through Anonymized Hashes

Abstract: Password authentication is an essential and widespread form of user authentication on the Internet with no other authentication system matching its dominance. When a password on one website is breached, if reused, the stolen password can be used to gain access to multiple other authenticated websites. Even amongst technically educated users, the security issues surrounding password reuse are not well understood and restrictive password composition rules have been unsuccessful in reducing password reuse. In res… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…(Li et al, 2019) vides an overview of protocols for compromised credential checking (C3) services and a mechanism for empirically evaluating such protocols. Such protocols are based off the HIBP protocol whereby passwords are bucketed based on a hash prefix, allowing for kanonymous verification of a breached password as implemented in (Ali, 2017). This bucket is then served to the user to identify if the password is breached or not.…”
Section: Related Workmentioning
confidence: 99%
“…(Li et al, 2019) vides an overview of protocols for compromised credential checking (C3) services and a mechanism for empirically evaluating such protocols. Such protocols are based off the HIBP protocol whereby passwords are bucketed based on a hash prefix, allowing for kanonymous verification of a breached password as implemented in (Ali, 2017). This bucket is then served to the user to identify if the password is breached or not.…”
Section: Related Workmentioning
confidence: 99%
“…The key issue to solve here is allowing for users to compute the Rolling Proximity Identifiers of users they may have come into contact with without leaking the information of all affected users. Developers of contact tracing apps [8] have sought guidance on implementing my original k-Anonymity communication protocol [9] to mitigate this effect (a protocol originally devised for compromised credential checking).…”
Section: Related Workmentioning
confidence: 99%
“…We seek to allow a user to query CCIs whilst minimising the privacy loss both on the server and for the client. Fortunately, this is a well explored problem in [9], [11], [12].…”
Section: B Efficient Rolling Proximity Identifier Searchmentioning
confidence: 99%
See 2 more Smart Citations