{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:13:10Z","timestamp":1767262390527,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":65,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819609345"},{"type":"electronic","value":"9789819609352"}],"license":[{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0935-2_3","type":"book-chapter","created":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T18:01:26Z","timestamp":1733680886000},"page":"66-100","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Threshold PAKE with\u00a0Security Against Compromise of\u00a0All Servers"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6577-2704","authenticated-orcid":false,"given":"Yanqi","family":"Gu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5055-2407","authenticated-orcid":false,"given":"Stanislaw","family":"Jarecki","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2270-8694","authenticated-orcid":false,"given":"Pawel","family":"Kedzior","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-1230-6941","authenticated-orcid":false,"given":"Phillip","family":"Nazarian","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0881-9980","authenticated-orcid":false,"given":"Jiayu","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"3_CR1","unstructured":"Facebook stored hundreds of millions of passwords in plain text, https:\/\/www.theverge.com\/2019\/3\/21\/18275837\/facebook-plain-text-password-storage-hundreds-millions-users. 2019."},{"key":"3_CR2","unstructured":"Google stored some passwords in plain text for fourteen years, https:\/\/www.theverge.com\/2019\/5\/21\/18634842\/google-passwords-plain-text-g-suite-fourteen-years. 2019."},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, and David Pointcheval. A simple threshold authenticated key exchange from short secrets. In Bimal\u00a0K. Roy, editor, ASIACRYPT\u00a02005, volume 3788 of LNCS, pages 566\u2013584. Springer, Berlin, Heidelberg, December 2005.","DOI":"10.1007\/11593447_31"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Michel Abdalla, Pierre-Alain Fouque, and David Pointcheval. Password-based authenticated key exchange in the three-party setting. In Serge Vaudenay, editor, PKC\u00a02005, volume 3386 of LNCS, pages 65\u201384. Springer, Berlin, Heidelberg, January 2005.","DOI":"10.1007\/978-3-540-30580-4_6"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Martin\u00a0R. Albrecht, Alex Davidson, Amit Deo, and Nigel\u00a0P. Smart. Round-optimal verifiable oblivious pseudorandom functions from ideal lattices. In Juan Garay, editor, PKC\u00a02021, Part\u00a0II, volume 12711 of LNCS, pages 261\u2013289. Springer, Cham, May 2021.","DOI":"10.1007\/978-3-030-75248-4_10"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Ali Bagherzandi, Stanislaw Jarecki, Nitesh Saxena, and Yanbin Lu. Password-protected secret sharing. In Yan Chen, George Danezis, and Vitaly Shmatikov, editors, ACM CCS 2011, pages 433\u2013444. ACM Press, October 2011.","DOI":"10.1145\/2046707.2046758"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Carsten Baum, Tore Kasper Frederiksen, Julia Hesse, Anja Lehmann, and Avishay Yanai. Pesto: Proactively secure distributed single sign-on, or how to trust a hacked server. In Proceedings - 5th IEEE European Symposium on Security and Privacy, Euro S and P 2020, pages 587\u2013606. IEEE, 2020. 2020 IEEE European Symposium on Security and Privacy (EuroS &P) ; Conference date: 07-09-2020 Through 11-09-2020.","DOI":"10.1109\/EuroSP48549.2020.00044"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Mihir Bellare, David Pointcheval, and Phillip Rogaway. Authenticated key exchange secure against dictionary attacks. In Bart Preneel, editor, EUROCRYPT\u00a02000, volume 1807 of LNCS, pages 139\u2013155. Springer, Berlin, Heidelberg, May 2000.","DOI":"10.1007\/3-540-45539-6_11"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Michael Ben-Or, Shafi Goldwasser, and Avi Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract). In 20th ACM STOC, pages 1\u201310. ACM Press, May 1988.","DOI":"10.1145\/62212.62213"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Olivier Blazy, C\u00e9line Chevalier, and Damien Vergnaud. Mitigating server breaches in password-based authentication: Secure and efficient solutions. In Kazue Sako, editor, CT-RSA\u00a02016, volume 9610 of LNCS, pages 3\u201318. Springer, Cham, February\u00a0\/\u00a0March 2016.","DOI":"10.1007\/978-3-319-29485-8_1"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Dan Boneh. The decision diffie-hellman problem. Stanford Cryptography Group webpage, 1998. https:\/\/crypto.stanford.edu\/~dabo\/pubs\/papers\/DDH.pdf","DOI":"10.1007\/BFb0054851"},{"key":"3_CR12","unstructured":"D.\u00a0Bourdrez, H.\u00a0Krawczyk, K.\u00a0Lewi, and C.\u00a0Wood. The OPAQUE Asymmetric PAKE Protocol, draft-irtf-cfrg-opaque, https:\/\/tools.ietf.org\/id\/draft-irtf-cfrg-opaque, July 2022."},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Tatiana Bradley, Stanislaw Jarecki, and Jiayu Xu. Strong asymmetric PAKE based on trapdoor CKEM. In Alexandra Boldyreva and Daniele Micciancio, editors, CRYPTO\u00a02019, Part\u00a0III, volume 11694 of LNCS, pages 798\u2013825. Springer, Cham, August 2019.","DOI":"10.1007\/978-3-030-26954-8_26"},{"key":"3_CR14","unstructured":"John\u00a0G. Brainard, Ari Juels, Burt Kaliski, and Michael Szydlo. A new two-server approach for authentication with short secrets. In USENIX Security 2003. USENIX Association, August 2003."},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Jan Camenisch, Robert\u00a0R. Enderlein, and Gregory Neven. Two-server password-authenticated secret sharing UC-secure against transient corruptions. In Jonathan Katz, editor, PKC\u00a02015, volume 9020 of LNCS, pages 283\u2013307. Springer, Berlin, Heidelberg, March\u00a0\/\u00a0April 2015.","DOI":"10.1007\/978-3-662-46447-2_13"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, and Gregory Neven. Memento: How to reconstruct your secrets from a single password in a hostile environment. In Juan\u00a0A. Garay and Rosario Gennaro, editors, CRYPTO\u00a02014, Part\u00a0II, volume 8617 of LNCS, pages 256\u2013275. Springer, Berlin, Heidelberg, August 2014.","DOI":"10.1007\/978-3-662-44381-1_15"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Jan Camenisch, Anja Lehmann, and Gregory Neven. Optimal distributed password verification. In Indrajit Ray, Ninghui Li, and Christopher Kruegel, editors, ACM CCS 2015, pages 182\u2013194. ACM Press, October 2015.","DOI":"10.1145\/2810103.2813722"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Jan Camenisch, Anna Lysyanskaya, and Gregory Neven. Practical yet universally composable two-server password-authenticated secret sharing. In Ting Yu, George Danezis, and Virgil\u00a0D. Gligor, editors, ACM CCS 2012, pages 525\u2013536. ACM Press, October 2012.","DOI":"10.1145\/2382196.2382252"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Ran Canetti. Universally composable security: A new paradigm for cryptographic protocols. In 42nd FOCS, pages 136\u2013145. IEEE Computer Society Press, October 2001.","DOI":"10.1109\/SFCS.2001.959888"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Ran Canetti and Shafi Goldwasser. An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack. In Jacques Stern, editor, EUROCRYPT\u201999, volume 1592 of LNCS, pages 90\u2013106. Springer, Berlin, Heidelberg, May 1999.","DOI":"10.1007\/3-540-48910-X_7"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Lindell, and Philip\u00a0D. MacKenzie. Universally composable password-based key exchange. In Ronald Cramer, editor, EUROCRYPT\u00a02005, volume 3494 of LNCS, pages 404\u2013421. Springer, Berlin, Heidelberg, May 2005.","DOI":"10.1007\/11426639_24"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"S\u00edlvia Casacuberta, Julia Hesse, and Anja Lehmann. Sok: Oblivious pseudorandom functions. Cryptology ePrint Archive, Paper 2022\/302, 2022. https:\/\/eprint.iacr.org\/2022\/302.","DOI":"10.1109\/EuroSP53844.2022.00045"},{"key":"3_CR23","unstructured":"Poulami Das, Julia Hesse, and Anja Lehmann. Dpase: Distributed password-authenticated symmetric encryption. Cryptology ePrint Archive, Paper 2020\/1443, 2020. https:\/\/eprint.iacr.org\/2020\/1443."},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Sourav Das and Ling Ren. Adaptively secure BLS threshold signatures from DDH and co-CDH. In Leonid Reyzin and Douglas Stebila, editors, CRYPTO\u00a02024, Part\u00a0VII, volume 14926 of LNCS, pages 251\u2013284. Springer, Cham, August 2024.","DOI":"10.1007\/978-3-031-68394-7_9"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Mario Di Raimondo and Rosario Gennaro. Provably secure threshold password-authenticated key exchange. In Eli Biham, editor, EUROCRYPT\u00a02003, volume 2656 of LNCS, pages 507\u2013523. Springer, Berlin, Heidelberg, May 2003.","DOI":"10.1007\/3-540-39200-9_32"},{"key":"3_CR26","unstructured":"Stefan Dziembowski, Stanislaw Jarecki, Pawel Kedzior, Hugo Krawczyk, Nam Ngo, and Jiayu Xu. Password-protected threshold signatures. IACR Cryptology ePrint Archive, 2024."},{"key":"3_CR27","unstructured":"Adam Everspaugh, Rahul Chatterjee, Samuel Scott, Ari Juels, and Thomas Ristenpart. The pythia PRF service. In Jaeyeon Jung and Thorsten Holz, editors, USENIX Security 2015, pages 547\u2013562. USENIX Association, August 2015."},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Warwick Ford and Burton\u00a0S. Kaliski Jr. Server-assisted generation of a strong secret from a password. In 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), pages 176\u2013180, Gaithersburg, MD, USA, June\u00a04\u201316, 2000. IEEE Computer Society.","DOI":"10.1109\/ENABL.2000.883724"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Michael\u00a0J. Freedman, Yuval Ishai, Benny Pinkas, and Omer Reingold. Keyword search and oblivious pseudorandom functions. In Joe Kilian, editor, TCC\u00a02005, volume 3378 of LNCS, pages 303\u2013324. Springer, Berlin, Heidelberg, February 2005.","DOI":"10.1007\/978-3-540-30576-7_17"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Bruno Freitas Dos Santos, Yanqi Gu, Stanislaw Jarecki, and Hugo Krawczyk. Asymmetric pake with low computation and communication. In EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 2022.","DOI":"10.1007\/978-3-031-07085-3_5"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Craig Gentry, Philip\u00a0D. Mackenzie, and Zulfikar Ramzan. Password authenticated key exchange using hidden smooth subgroups. In Vijayalakshmi Atluri, Catherine Meadows, and Ari Juels, editors, ACM CCS 2005, pages 299\u2013309. ACM Press, November 2005.","DOI":"10.1145\/1102120.1102160"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Oded Goldreich, Silvio Micali, and Avi Wigderson. How to play any mental game or A completeness theorem for protocols with honest majority. In Alfred Aho, editor, 19th ACM STOC, pages 218\u2013229. ACM Press, May 1987.","DOI":"10.1145\/28395.28420"},{"key":"3_CR33","unstructured":"Yanqi Gu, Stanislaw Jarecki, Pawel Kedzior, Phillip Nazarian, and Jiayu Xu. Threshold pake with security against compromise of all servers. Cryptology ePrint Archive, report 2024\/1455, 2024."},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Yanqi Gu, Stanislaw Jarecki, and Hugo Krawczyk. KHAPE: Asymmetric PAKE from key-hiding key exchange. In Advances in Cryptology - Crypto 2021, pages 701\u2013730, 2021. https:\/\/ia.cr\/2021\/873.","DOI":"10.1007\/978-3-030-84259-8_24"},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, and Moti Yung. Proactive secret sharing or: How to cope with perpetual leakage. In Don Coppersmith, editor, CRYPTO\u201995, volume 963 of LNCS, pages 339\u2013352. Springer, Berlin, Heidelberg, August 1995.","DOI":"10.1007\/3-540-44750-4_27"},{"key":"3_CR36","doi-asserted-by":"crossref","unstructured":"Julia Hesse, Stanislaw Jarecki, Hugo Krawczyk, and Christopher Wood. Password-authenticated TLS via OPAQUE and post-handshake authentication. In Carmit Hazay and Martijn Stam, editors, EUROCRYPT\u00a02023, Part\u00a0V, volume 14008 of LNCS, pages 98\u2013127. Springer, Cham, April 2023.","DOI":"10.1007\/978-3-031-30589-4_4"},{"key":"3_CR37","doi-asserted-by":"crossref","unstructured":"David\u00a0P. Jablon. Password authentication using multiple servers. In David Naccache, editor, CT-RSA\u00a02001, volume 2020 of LNCS, pages 344\u2013360. Springer, Berlin, Heidelberg, April 2001.","DOI":"10.1007\/3-540-45353-9_26"},{"key":"3_CR38","doi-asserted-by":"crossref","unstructured":"Stanislaw Jarecki, Aggelos Kiayias, and Hugo Krawczyk. Round-optimal password-protected secret sharing and T-PAKE in the password-only model. In Palash Sarkar and Tetsu Iwata, editors, ASIACRYPT\u00a02014, Part\u00a0II, volume 8874 of LNCS, pages 233\u2013253. Springer, Berlin, Heidelberg, December 2014.","DOI":"10.1007\/978-3-662-45608-8_13"},{"key":"3_CR39","doi-asserted-by":"crossref","unstructured":"Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, and Jiayu Xu. Highly-efficient and composable password-protected secret sharing (or: how to protect your bitcoin wallet online). In IEEE European Symposium on Security and Privacy \u2013 EuroS &P 2016, pages 276\u2013291. IEEE, 2016.","DOI":"10.1109\/EuroSP.2016.30"},{"key":"3_CR40","doi-asserted-by":"crossref","unstructured":"Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, and Jiayu Xu. TOPPSS: Cost-minimal password-protected secret sharing based on threshold OPRF. In Dieter Gollmann, Atsuko Miyaji, and Hiroaki Kikuchi, editors, ACNS 17International Conference on Applied Cryptography and Network Security, volume 10355 of LNCS, pages 39\u201358. Springer, Cham, July 2017.","DOI":"10.1007\/978-3-319-61204-1_3"},{"key":"3_CR41","unstructured":"Stanislaw Jarecki, Hugo Krawczyk, and Jason Resch. Threshold partially-oblivious PRFs with applications to key management. Cryptology ePrint Archive, Report 2018\/733, 2018."},{"key":"3_CR42","doi-asserted-by":"crossref","unstructured":"Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, and Nitesh Saxena. Device-enhanced password protocols with optimal online-offline protection. In Xiaofeng Chen, XiaoFeng Wang, and Xinyi Huang, editors, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi\u2019an, China, May 30 - June 3, 2016, pages 177\u2013188. ACM, 2016.","DOI":"10.1145\/2897845.2897880"},{"key":"3_CR43","doi-asserted-by":"crossref","unstructured":"Stanislaw Jarecki, Hugo Krawczyk, and Jiayu Xu. OPAQUE: An asymmetric PAKE protocol secure against pre-computation attacks. In Jesper\u00a0Buus Nielsen and Vincent Rijmen, editors, EUROCRYPT\u00a02018, Part\u00a0III, volume 10822 of LNCS, pages 456\u2013486. Springer, Cham, April\u00a0\/\u00a0May 2018.","DOI":"10.1007\/978-3-319-78372-7_15"},{"key":"3_CR44","doi-asserted-by":"crossref","unstructured":"Stanislaw Jarecki and Xiaomin Liu. Affiliation-hiding envelope and authentication schemes with efficient support for multiple credentials. In Automata, Languages and Programming, pages 715\u2013726, Berlin, Heidelberg, 2008. Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-540-70583-3_58"},{"key":"3_CR45","doi-asserted-by":"crossref","unstructured":"Stanislaw Jarecki and Xiaomin Liu. Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection. In Omer Reingold, editor, TCC\u00a02009, volume 5444 of LNCS, pages 577\u2013594. Springer, Berlin, Heidelberg, March 2009.","DOI":"10.1007\/978-3-642-00457-5_34"},{"key":"3_CR46","doi-asserted-by":"crossref","unstructured":"Haimin Jin, Duncan\u00a0S. Wong, and Yinlong Xu. An efficient password-only two-server authenticated key exchange system. In Sihan Qing, Hideki Imai, and Guilin Wang, editors, ICICS 07, volume 4861 of LNCS, pages 44\u201356. Springer, Berlin, Heidelberg, December 2008.","DOI":"10.1007\/978-3-540-77048-0_4"},{"key":"3_CR47","doi-asserted-by":"crossref","unstructured":"Jonathan Katz, Philip\u00a0D. MacKenzie, Gelareh Taban, and Virgil\u00a0D. Gligor. Two-server password-only authenticated key exchange. In John Ioannidis, Angelos Keromytis, and Moti Yung, editors, ACNS 05International Conference on Applied Cryptography and Network Security, volume 3531 of LNCS, pages 1\u201316. Springer, Berlin, Heidelberg, June 2005.","DOI":"10.1007\/11496137_1"},{"key":"3_CR48","doi-asserted-by":"crossref","unstructured":"Franziskus Kiefer and Mark Manulis. Distributed smooth projective hashing and its application to two-server password authenticated key exchange. In Ioana Boureanu, Philippe Owesarski, and Serge Vaudenay, editors, ACNS 14International Conference on Applied Cryptography and Network Security, volume 8479 of LNCS, pages 199\u2013216. Springer, Cham, June 2014.","DOI":"10.1007\/978-3-319-07536-5_13"},{"key":"3_CR49","doi-asserted-by":"crossref","unstructured":"Franziskus Kiefer and Mark Manulis. Universally composable two-server PAKE. In Matt Bishop and Anderson C.\u00a0A. Nascimento, editors, ISC\u00a02016, volume 9866 of LNCS, pages 147\u2013166. Springer, Cham, September 2016.","DOI":"10.1007\/978-3-319-45871-7_10"},{"key":"3_CR50","unstructured":"Russell W.\u00a0F. Lai, Christoph Egger, Dominique Schr\u00f6der, and Sherman S.\u00a0M. Chow. Phoenix: Rebirth of a cryptographic password-hardening service. In Engin Kirda and Thomas Ristenpart, editors, USENIX Security 2017, pages 899\u2013916. USENIX Association, August 2017."},{"key":"3_CR51","unstructured":"Leona Lassak, Annika Hildebrandt, Maximilian Golla, and Blase Ur. \u201cit\u2019s stored, hopefully, on an encrypted server\u201d: Mitigating users\u2019 misconceptions about fido2 biometric webauthn. In Proc. USENIX Security, 2021."},{"key":"3_CR52","doi-asserted-by":"crossref","unstructured":"Philip\u00a0D. MacKenzie, Thomas Shrimpton, and Markus Jakobsson. Threshold password-authenticated key exchange. In Moti Yung, editor, CRYPTO\u00a02002, volume 2442 of LNCS, pages 385\u2013400. Springer, Berlin, Heidelberg, August 2002.","DOI":"10.1007\/3-540-45708-9_25"},{"key":"3_CR53","doi-asserted-by":"crossref","unstructured":"Ian McQuoid and Jiayu Xu. An efficient strong asymmetric PAKE compiler instantiable from group actions. In Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VIII, volume 14445 of Lecture Notes in Computer Science, pages 176\u2013207. Springer, 2023.","DOI":"10.1007\/978-981-99-8742-9_6"},{"key":"3_CR54","unstructured":"Kentrell Owens, Olabode Anise, Amanda Krauss, and Blase Ur. User perceptions of the usability and security of smartphones as fido2 roaming authenticators. In SOUPS, pages 57\u201376, 2021."},{"key":"3_CR55","doi-asserted-by":"crossref","unstructured":"Hirak Ray, Flynn Wolf, Ravi Kuber, and Adam\u00a0J Aviv. Why older adults (don\u2019t) use password managers. In USENIX, 2021.","DOI":"10.2478\/popets-2021-0016"},{"key":"3_CR56","doi-asserted-by":"crossref","unstructured":"Bruno Freitas\u00a0Dos Santos, Yanqi Gu, Stanislaw Jarecki, and Hugo Krawczyk. Asymmetric PAKE with low computation and communication. In Orr Dunkelman and Stefan Dziembowski, editors, Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part II, volume 13276 of Lecture Notes in Computer Science, pages 127\u2013156. Springer, 2022.","DOI":"10.1007\/978-3-031-07085-3_5"},{"key":"3_CR57","doi-asserted-by":"crossref","unstructured":"Jonas Schneider, Nils Fleischhacker, Dominique Schr\u00f6der, and Michael Backes. Efficient cryptographic password hardening services from partially oblivious commitments. In Edgar\u00a0R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew\u00a0C. Myers, and Shai Halevi, editors, ACM CCS 2016, pages 1192\u20131203. ACM Press, October 2016.","DOI":"10.1145\/2976749.2978375"},{"key":"3_CR58","doi-asserted-by":"crossref","unstructured":"Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, and Nitesh Saxena. SPHINX: A password store that perfectly hides passwords from itself. In Kisung Lee and Ling Liu, editors, 37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-8, 2017, pages 1094\u20131104. IEEE Computer Society, 2017.","DOI":"10.1109\/ICDCS.2017.64"},{"key":"3_CR59","doi-asserted-by":"crossref","unstructured":"Maliheh Shirvanian, Christopher\u00a0Robert Price, Mohammed Jubur, Nitesh Saxena, Stanislaw Jarecki, and Hugo Krawczyk. A hidden-password online password manager. In Chih-Cheng Hung, Jiman Hong, Alessio Bechini, and Eunjee Song, editors, SAC \u201921: The 36th ACM\/SIGAPP Symposium on Applied Computing, Virtual Event, Republic of Korea, March 22-26, 2021, pages 1683\u20131686. ACM, 2021.","DOI":"10.1145\/3412841.3442131"},{"key":"3_CR60","unstructured":"N.\u00a0Sullivan, H.\u00a0Krawczyk, O.\u00a0Friel, and R.\u00a0Barnes. OPAQUE with TLS 1.3, draft-sullivan-tls-opaque-01, https:\/\/datatracker.ietf.org\/doc\/html\/draft-sullivan-tls-opaque, February 2021."},{"key":"3_CR61","doi-asserted-by":"crossref","unstructured":"Michael Szydlo and Burton\u00a0S. Kaliski Jr. Proofs for two-server password authentication. In Alfred Menezes, editor, CT-RSA\u00a02005, volume 3376 of LNCS, pages 227\u2013244. Springer, Berlin, Heidelberg, February 2005.","DOI":"10.1007\/978-3-540-30574-3_16"},{"key":"3_CR62","doi-asserted-by":"crossref","unstructured":"Nirvan Tyagi, Sof\u00eda Celi, Thomas Ristenpart, Nick Sullivan, Stefano Tessaro, and Christopher\u00a0A. Wood. A fast and simple partially oblivious prf, with applications. In Advances in Cryptology - EUROCRYPT 2022: 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part II, page 674-705, Berlin, Heidelberg, 2022. Springer-Verlag.","DOI":"10.1007\/978-3-031-07085-3_23"},{"key":"3_CR63","doi-asserted-by":"crossref","unstructured":"Nirvan Tyagi, Sof\u00eda Celi, Thomas Ristenpart, Nick Sullivan, Stefano Tessaro, and Christopher\u00a0A. Wood. A fast and simple partially oblivious prf, with applications. In Orr Dunkelman and Stefan Dziembowski, editors, Advances in Cryptology \u2013 EUROCRYPT 2022, pages 674\u2013705, Cham, 2022. Springer International Publishing.","DOI":"10.1007\/978-3-031-07085-3_23"},{"key":"3_CR64","doi-asserted-by":"crossref","unstructured":"Yanjiang Yang, Robert Deng, and Feng Bao. A practical password-based two-server authentication and key exchange system. Dependable and Secure Computing, IEEE Transactions on, 3:105\u2013114, 05 2006.","DOI":"10.1109\/TDSC.2006.16"},{"key":"3_CR65","doi-asserted-by":"crossref","unstructured":"Lin Zhang, Zhenfeng Zhang, and Xuexian Hu. UC-secure two-server password-based authentication protocol and its applications. In Xiaofeng Chen, XiaoFeng Wang, and Xinyi Huang, editors, ASIACCS 16, pages 153\u2013164. ACM Press, May\u00a0\/\u00a0June 2016.","DOI":"10.1145\/2897845.2897872"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0935-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T18:02:04Z","timestamp":1733680924000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0935-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,9]]},"ISBN":["9789819609345","9789819609352"],"references-count":65,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0935-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,9]]},"assertion":[{"value":"9 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}