Password-based protocols are important and popular means of providing human-to-machine authentication. The concept of secret public keys was proposed more than a decade ago as a means of securing password-based authentication protocols against off-line password guessing attacks, but was later found vulnerable to various attacks. In this paper, we revisit the concept and introduce the notion of identity-based secret public keys. Our new identity-based approach allows secret public keys to be constructed in a very natural way using arbitrary random strings, eliminating the structure found in, for example, RSA or ElGamal keys. We examine identity-based secret public key protocols and give informal security analyses, indicating that they are secure against off-line password guessing and other attacks. © 2009 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Lim, H. W., & Paterson, K. G. (2009). Secret public key protocols revisited. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5087 LNCS, pp. 237–256). https://doi.org/10.1007/978-3-642-04904-0_32
Mendeley helps you to discover research relevant for your work.