2004
DOI: 10.1007/978-3-540-25980-0_29
|View full text |Cite
|
Sign up to set email alerts
|

Threshold Password-Based Authentication Using Bilinear Pairings

Abstract: We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private key from remote servers with knowledge of only his identity and password. He does not carry the smart card storing user's private information. We note that as a goal of a multi-server roaming system, a protocol has to allow a user to get his private key from the servers, even if some of the servers are compromised. With this point of v… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…A password constitutes a user-memorable secret [27] that consists of a few printable characters. Passwords are the common choice in computer systems for user authentication [28][29][30]. The system stores the user's identity and password for every account.…”
Section: Passwordsmentioning
confidence: 99%
“…A password constitutes a user-memorable secret [27] that consists of a few printable characters. Passwords are the common choice in computer systems for user authentication [28][29][30]. The system stores the user's identity and password for every account.…”
Section: Passwordsmentioning
confidence: 99%
“…A valid certificate of any node can be only generated correctly if a number of nodes exceeding a threshold cooperate. In [23], Lee et al presented an efficient threshold password based authentication scheme using (k, n) threshold scheme, which allows a roaming user who accesses a network from different client terminals to get his private key from the servers, even if some of the servers are compromised under the multi-server roaming system. Recently, Chai et al [24] also presented an efficient threshold password authentication scheme against password guessing attacks in ad hoc networks.…”
mentioning
confidence: 99%