ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Usage of Password-identified Scheme in view of Key Exchange

Journal: International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) (Vol.6, No. 3)

Publication Date:

Authors : ; ;

Page : 8-11

Keywords : Keywords: PAKE; Identity; ID2S; Cryptography;

Source : Downloadexternal Find it from : Google Scholarexternal


Abstract: In two-server secret word validated key trade (PAKE) convention, a customer parts its watchword and stores two shares of its secret key in the two servers, independently, and the two servers then work together to confirm the customer without knowing the watchword of the customer. If one server is traded off by an enemy, the mystery key of the customer is required to remain secure. In this paper, we show two compilers that change any two-party PAKE convention to a two-server PAKE convention on the preface of the character based cryptography, called ID2S PAKE convention.

Last modified: 2017-07-15 21:46:19