Usage of Password-identified Scheme in view of Key Exchange
Journal: International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) (Vol.6, No. 3)Publication Date: 2017-07-15
Authors : Anushree B N; Manjula G;
Page : 8-11
Keywords : Keywords: PAKE; Identity; ID2S; Cryptography;
Abstract
Abstract: In two-server secret word validated key trade (PAKE) convention, a customer parts its watchword and stores two shares of its secret key in the two servers, independently, and the two servers then work together to confirm the customer without knowing the watchword of the customer. If one server is traded off by an enemy, the mystery key of the customer is required to remain secure. In this paper, we show two compilers that change any two-party PAKE convention to a two-server PAKE convention on the preface of the character based cryptography, called ID2S PAKE convention.
Other Latest Articles
- Redundant and Tractable User Account Validation for Protective Internet Services
- Smart Offline Shopping Based on Augmented Reality Interfaces
- FOLK RELIGION IN THE CENTRAL HIMALAYAS (KUMAON AND GARHWAL)
- SIMULATED TEACHING: A PRAGMATIC APPROACH IN TEACHING OF HOME SCIENCE
- 21ST CENTURY PUBLIC LIBRARY: A VENTURE TO GET AT ELITE TO TOM, DICK AND HARRY OF INDIA
Last modified: 2017-07-15 21:46:19