Fukumitsu et al., 2016 - Google Patents
A proposal of a password manager satisfying security and usability by using the secret sharing and a personal serverFukumitsu et al., 2016
- Document ID
- 8055381553951322174
- Author
- Fukumitsu M
- Hasegawa S
- Iwazaki J
- Sakai M
- Takahashi D
- Publication year
- Publication venue
- 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)
External Links
Snippet
Password managers protect users' passwords by using a master password or a security token. The security of them using the master password is weakened if users use weak master passwords. The usability of them using the security token is low since users always …
- 230000000875 corresponding 0 description 10
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kumari et al. | Cryptanalysis and improvement of ‘a robust smart‐card‐based remote user password authentication scheme’ | |
JP6976951B2 (en) | Devices and methods for resonant encryption | |
Kumari et al. | An improved remote user authentication scheme with key agreement | |
Kumari et al. | More secure smart card‐based remote user password authentication scheme with user anonymity | |
Kumar et al. | A survey on secure cloud: security and privacy in cloud computing | |
US20080155267A1 (en) | Identity management system with an untrusted identity provider | |
Maitra et al. | An enhanced multi‐server authentication protocol using password and smart‐card: cryptanalysis and design | |
US20080155664A1 (en) | Identity management system with an untrusted identity provider | |
Wen et al. | A robust smart card‒based anonymous user authentication protocol for wireless communications | |
ShanmugaPriya et al. | The personal authentication service and security enhancement for optimal strong password | |
JP2024110939A (en) | Cybersecurity method and system based on multi-party and multi-factor dynamic strong cryptographic authentication | |
Fukumitsu et al. | A proposal of a password manager satisfying security and usability by using the secret sharing and a personal server | |
Das et al. | A decentralized open web cryptographic standard | |
Zhang et al. | Distributed ciphertext-policy attribute-based encryption with enhanced collusion resilience and privacy preservation | |
Zmezm et al. | A Novel Scan2Pass Architecture for Enhancing Security towards E-Commerce | |
CN108881153A (en) | Authentication method for login | |
Horsch et al. | PALPAS--PAssword Less PAssword Synchronization | |
Agarwal et al. | Guarded dual authentication based DRM with resurgence dynamic encryption techniques | |
Althamary et al. | A more secure scheme for CAPTCHA-based authentication in cloud environment | |
CN115051848A (en) | Identity authentication method based on block chain | |
JP5799635B2 (en) | ENCRYPTED DATA SEARCH SYSTEM, DEVICE, METHOD, AND PROGRAM | |
Gaharana et al. | A new approach for remote user authentication in a multi-server environment based on dynamic-id using smart-card | |
Mehta et al. | Group authentication using paillier threshold cryptography | |
CN112035820B (en) | Data analysis method used in Kerberos encryption environment | |
CN103312671A (en) | Method and system for verifying server |