2017
DOI: 10.7287/peerj.preprints.3322v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Mechanism for the prevention of password reuse through Anonymized Hashes

Abstract: Password authentication is an essential and widespread form of user authentication on the Internet with no other authentication system matching its dominance. When a password on one website is breached, if reused, the stolen password can be used to gain access to multiple other authenticated websites. Even amongst technically educated users, the security issues surrounding password reuse are not well understood and restrictive password composition rules have been unsuccessful in reducing password reuse. In res… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…The key issue to solve here is allowing for users to compute the Rolling Proximity Identifiers of users they may have come into contact with without leaking the information of all affected users. Developers of contact tracing apps [9] have sought guidance on implementing our original k-Anonymity communication protocol [10] to mitigate this effect (a protocol originally devised for compromised credential checking).…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…The key issue to solve here is allowing for users to compute the Rolling Proximity Identifiers of users they may have come into contact with without leaking the information of all affected users. Developers of contact tracing apps [9] have sought guidance on implementing our original k-Anonymity communication protocol [10] to mitigate this effect (a protocol originally devised for compromised credential checking).…”
Section: Related Workmentioning
confidence: 99%
“…We seek to allow a user to query CCIs whilst minimising the privacy loss both on the server and for the client. Fortunately, this is a well explored problem in [10], [12], [13].…”
Section: B Efficient Rolling Proximity Identifier Searchmentioning
confidence: 99%
See 2 more Smart Citations