Threshold Password-Based Authentication Using Bilinear Pairings

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 554
  • Download : 494
DC FieldValueLanguage
dc.contributor.authorLee, Songwon-
dc.contributor.authorYang, Jeongkyu-
dc.contributor.authorKim, Kwangjo-
dc.date.accessioned2009-12-28T08:37:43Z-
dc.date.available2009-12-28T08:37:43Z-
dc.date.issued2003-10-
dc.identifier.citationCSS2003, pp.19-24en
dc.identifier.urihttp://hdl.handle.net/10203/15913-
dc.description.abstractWe present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private key from remote servers with knowledge of only his identity and password. He does not carry the smart card storing user’s private information. We note that as a goal of a multi-server roaming system, a protocol has to allow a user to get his private key from the servers, even if some of the servers are compromised. With this point of view, we give the first description of a threshold password-only roaming protocol. In this paper, we use (k,n)-threshold scheme in which only k honest servers or more are engaged to reconstruct a secret key. Our scheme is based on bilinear pairings which could be built from Weil pairing or Tate pairing.en
dc.language.isoen_USen
dc.publisherCSSen
dc.titleThreshold Password-Based Authentication Using Bilinear Pairingsen
dc.typeArticleen

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0