{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T12:39:58Z","timestamp":1775565598104,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T00:00:00Z","timestamp":1318809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,17]]},"DOI":"10.1145\/2046707.2046758","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T13:02:00Z","timestamp":1318942920000},"page":"433-444","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":81,"title":["Password-protected secret sharing"],"prefix":"10.1145","author":[{"given":"Ali","family":"Bagherzandi","sequence":"first","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Stanislaw","family":"Jarecki","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Nitesh","family":"Saxena","sequence":"additional","affiliation":[{"name":"Polytechnic Institute of New York University, New York, NY, USA"}]},{"given":"Yanbin","family":"Lu","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"M.\n      Abdalla M.\n      Bellare and \n      P.\n      Rogaway\n  . \n  The oracle diffie-hellman assumptions and an analysis of DHIES\n  . In D. Naccache editor CT-RSA volume \n  2020\n   of \n  Lecture Notes in Computer Science pages \n  143\n  --\n  158\n  . \n  Springer 2001\n  .   M. Abdalla M. Bellare and P. Rogaway. The oracle diffie-hellman assumptions and an analysis of DHIES. In D. Naccache editor CT-RSA volume 2020 of Lecture Notes in Computer Science pages 143--158. Springer 2001.","DOI":"10.1007\/3-540-45353-9_12"},{"key":"e_1_3_2_1_2_1","volume-title":"EUROCRYPT,pages 236--255","author":"Bellare M.","year":"1998","unstructured":"M. Bellare , J. A. Garay , and T. Rabin . Fast batch verification for modular exponentiation and digital signatures . In EUROCRYPT,pages 236--255 , 1998 . M. Bellare, J. A. Garay, and T. Rabin. Fast batch verification for modular exponentiation and digital signatures. In EUROCRYPT,pages 236--255, 1998."},{"key":"e_1_3_2_1_3_1","first-page":"201","volume-title":"12th USENIX Security Symp","author":"Brainard J.","year":"2003","unstructured":"J. Brainard , A. Juels , B. Kaliski , and M. Szydlo . Nightingale: A new two-server approach for authentication with short secrets . In 12th USENIX Security Symp , pages 201 -- 213 . IEEE Comp. Soc. 2003 . J. Brainard, A. Juels, B. Kaliski, and M. Szydlo. Nightingale: A new two-server approach for authentication with short secrets. In 12th USENIX Security Symp, pages 201--213. IEEE Comp. Soc. 2003."},{"key":"e_1_3_2_1_4_1","series-title":"LNCS","first-page":"107","volume-title":"EUROCRYPT'99","author":"Camenisch J.","year":"1999","unstructured":"J. Camenisch and M. Michels . Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes . In EUROCRYPT'99 , volume 1592 of LNCS , pages 107 -- 122 , 1999 . J. Camenisch and M. Michels. Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes. In EUROCRYPT'99, volume 1592 of LNCS, pages 107--122, 1999."},{"key":"e_1_3_2_1_5_1","series-title":"LNCS","first-page":"98","volume-title":"CRYPTO'99","author":"Canetti R.","year":"1999","unstructured":"R. Canetti , R. Gennaro , S. Jarecki , H. Krawczyk , and T. Rabin . Adaptive security for threshold cryptosystems . In CRYPTO'99 , volume 1666 of LNCS , pages 98 -- 115 , 1999 . R. Canetti, R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Adaptive security for threshold cryptosystems. In CRYPTO'99, volume 1666 of LNCS, pages 98--115, 1999."},{"key":"e_1_3_2_1_6_1","series-title":"LNCS","first-page":"307","volume-title":"CRYPTO '89","author":"Desmedt Y.","year":"1990","unstructured":"Y. Desmedt and Y. Frankel . Threshold Cryptosystems . In CRYPTO '89 , volume 435 of LNCS , pages 307 -- 315 , 1990 . Y. Desmedt and Y. Frankel. Threshold Cryptosystems. In CRYPTO '89, volume 435 of LNCS, pages 307--315, 1990."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2006.02.002"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1767011.1767014"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Y.\n      Dodis J.\n      Katz S.\n      Xu and \n      M.\n      Yung\n  . \n  Key-insulated public key cryptosystems\n  . In L. R. Knudsen editor EUROCRYPT volume \n  2332\n   of \n  Lecture Notes in Computer Science pages \n  65\n  --\n  82\n  . \n  Springer 2002\n  .   Y. Dodis J. Katz S. Xu and M. Yung. Key-insulated public key cryptosystems. In L. R. Knudsen editor EUROCRYPT volume 2332 of Lecture Notes in Computer Science pages 65--82. Springer 2002.","DOI":"10.1007\/3-540-46035-7_5"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_10"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/647068.715647"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"J. A.\n      Garay P. D.\n      MacKenzie and \n      K.\n      Yang\n  . \n  Strengthening zero-knowledge protocols using signatures\n  . In E. Biham editor EUROCRYPT volume \n  2656\n   of \n  Lecture Notes in Computer Science pages \n  177\n  --\n  194\n  . \n  Springer 2003\n  .   J. A. Garay P. D. MacKenzie and K. Yang. Strengthening zero-knowledge protocols using signatures. In E. Biham editor EUROCRYPT volume 2656 of Lecture Notes in Computer Science pages 177--194. Springer 2003.","DOI":"10.1007\/3-540-39200-9_11"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1984.715946"},{"key":"e_1_3_2_1_14_1","first-page":"344","volume-title":"CT-RSA'01: RSA Cryptographers' Track","author":"Jablon D.","year":"2001","unstructured":"D. Jablon . Password authentication using multiple servers . In CT-RSA'01: RSA Cryptographers' Track , pages 344 -- 360 . Springer-Verlag , 2001 . D. Jablon. Password authentication using multiple servers. In CT-RSA'01: RSA Cryptographers' Track, pages 344--360. Springer-Verlag, 2001."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_1"},{"key":"e_1_3_2_1_16_1","volume-title":"International Conference on the Theory and Application of Cryptographic Techniques","author":"Katz J.","year":"2001","unstructured":"J. Katz , R. Ostrovsky , and M. Yung . Efficient password-authenticated key exchange using human-memorable passwords. In Advances in Cryptology - EUROCRYPT 2001 , International Conference on the Theory and Application of Cryptographic Techniques , 2001 . J. Katz, R. Ostrovsky, and M. Yung. Efficient password-authenticated key exchange using human-memorable passwords. In Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, 2001."},{"key":"e_1_3_2_1_17_1","volume-title":"Lastpass password manager","year":"2009","unstructured":"LastPass. Lastpass password manager , 2009 . Available at https:\/\/lastpass.com. LastPass. Lastpass password manager, 2009. Available at https:\/\/lastpass.com."},{"issue":"1","key":"e_1_3_2_1_18_1","first-page":"1","volume":"2","author":"MacKenzie P. D.","year":"2003","unstructured":"P. D. MacKenzie and M. K. Reiter . Networked Cryptographic devices resilient to capture. Int. J. Inf. Sec. , 2 ( 1 ): 1 -- 20 , 2003 . P. D. MacKenzie and M. K. Reiter. Networked Cryptographic devices resilient to capture. Int. J. Inf. Sec., 2(1):1--20, 2003.","journal-title":"Networked Cryptographic devices resilient to capture. Int. J. Inf. Sec."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-005-0232-5"},{"key":"e_1_3_2_1_20_1","volume-title":"Weave sync","author":"Labs Mozilla","year":"2009","unstructured":"Mozilla Labs . Weave sync , 2009 . Available at http:\/\/labs.mozilla.com\/projects\/weave. Mozilla Labs. Weave sync, 2009. Available at http:\/\/labs.mozilla.com\/projects\/weave."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100273"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/795665.796535"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_24_1","series-title":"LNCS","first-page":"207","volume-title":"EUROCRYPT'00","author":"Shoup V.","year":"2000","unstructured":"V. Shoup . Practical Threshold Signatures . In EUROCRYPT'00 , volume 1807 of LNCS , pages 207 -- 220 , 2000 . V. Shoup. Practical Threshold Signatures. In EUROCRYPT'00, volume 1807 of LNCS, pages 207--220, 2000."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0020-9"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1767011.1767050"}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","location":"Chicago Illinois USA","acronym":"CCS'11","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 18th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046758","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046707.2046758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:42Z","timestamp":1750240122000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046758"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,17]]},"references-count":26,"alternative-id":["10.1145\/2046707.2046758","10.1145\/2046707"],"URL":"https:\/\/doi.org\/10.1145\/2046707.2046758","relation":{},"subject":[],"published":{"date-parts":[[2011,10,17]]},"assertion":[{"value":"2011-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}