Two-server password-only authenticated key exchange

62Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

Typical protocols for password-based authentication assume a single server which stores all the information (e.g., the password) necessary to authenticate a user. Unfortunately, an inherent limitation of this approach (assuming low-entropy passwords are used) is that the user's password is exposed if this server is ever compromised. To address this issue, a number of schemes have been proposed in which a user's password information is shared among multiple servers, and these servers cooperate in a threshold manner when the user wants to authenticate. We show here a two-server protocol for this task assuming public parameters available to everyone in the system (as well as the adversary). Ours is the first provably-secure two-server protocol for the important password-only setting (in which the user need remember only a password, and not the servers' public keys), and is the first two-server protocol (in any setting) with a proof of security in the standard model. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Katz, J., MacKenzie, P., Taban, G., & Gligor, V. (2005). Two-server password-only authenticated key exchange. In Lecture Notes in Computer Science (Vol. 3531, pp. 1–16). Springer Verlag. https://doi.org/10.1007/11496137_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free