Usage of Password-identified Scheme in view of Key ExchangeJournal: International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) (Vol.6, No. 3)
Publication Date: 2017-07-15
Authors : Anushree B N; Manjula G;
Page : 8-11
Keywords : Keywords: PAKE; Identity; ID2S; Cryptography;
Abstract: In two-server secret word validated key trade (PAKE) convention, a customer parts its watchword and stores two shares of its secret key in the two servers, independently, and the two servers then work together to confirm the customer without knowing the watchword of the customer. If one server is traded off by an enemy, the mystery key of the customer is required to remain secure. In this paper, we show two compilers that change any two-party PAKE convention to a two-server PAKE convention on the preface of the character based cryptography, called ID2S PAKE convention.
Other Latest Articles
Last modified: 2017-07-15 21:46:19