How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior

Eyal Ronen
Eyal Ronen

IACR Cryptology ePrint Archive, Volume 2018, 2018, Pages 1369-1386.

Cited by: 5|Bibtex|Views5|Links
EI
Keywords:
differential privacy heavy hitters malicious model passwords secure computation

Abstract:

Bad choices of passwords were and are a pervasive problem. Users choosing weak passwords do not only compromise themselves, but the whole ecosystem. E.g, common and default passwords in IoT devices were exploited by hackers to create botnets and mount severe attacks on large Internet services, such as the Mirai botnet DDoS attack. We pres...More

Code:

Data:

Your rating :
0

 

Tags
Comments