Skip to content

Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing

License

Notifications You must be signed in to change notification settings

SecUSo/t-n-threshold-verification

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 

Repository files navigation

(t,n)-threshold verification scheme

This repository holds the code to the paper "Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing" by Peter Mayer and Melanie Volkamer (http://dx.doi.org/10.1145/2818000.2818043). The code implements and illustrates the procedure of the verification scheme along the example of a graphical recognition-based authentication scheme. The first section of the Mathematica notebook contains all the parameters needed for the computation. The second section details the six steps neeed to create the public information (analog of e.g. the stored hash in traditional text password settings). The third section details the five steps required to verify the user input. The fourth section contains the functions used in the efficiency evalaution.

About

Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published