Secret public key protocols revisited

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Password-based protocols are important and popular means of providing human-to-machine authentication. The concept of secret public keys was proposed more than a decade ago as a means of securing password-based authentication protocols against off-line password guessing attacks, but was later found vulnerable to various attacks. In this paper, we revisit the concept and introduce the notion of identity-based secret public keys. Our new identity-based approach allows secret public keys to be constructed in a very natural way using arbitrary random strings, eliminating the structure found in, for example, RSA or ElGamal keys. We examine identity-based secret public key protocols and give informal security analyses, indicating that they are secure against off-line password guessing and other attacks. © 2009 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Lim, H. W., & Paterson, K. G. (2009). Secret public key protocols revisited. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5087 LNCS, pp. 237–256). https://doi.org/10.1007/978-3-642-04904-0_32

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free