This repository holds the code to the paper "Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing" by Peter Mayer and Melanie Volkamer (http://dx.doi.org/10.1145/2818000.2818043). The code implements and illustrates the procedure of the verification scheme along the example of a graphical recognition-based authentication scheme. The first section of the Mathematica notebook contains all the parameters needed for the computation. The second section details the six steps neeed to create the public information (analog of e.g. the stored hash in traditional text password settings). The third section details the five steps required to verify the user input. The fourth section contains the functions used in the efficiency evalaution.
-
Notifications
You must be signed in to change notification settings - Fork 0
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing
License
SecUSo/t-n-threshold-verification
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing
Resources
License
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published