Token Based Multiparty Password Authenticated Key Retrieval Process

A process to allow a user with a password P, to retrieve a secret key (or any other strong secret) K with the help of multiple independent servers. The secrecy of P and K is preserved if at least one server is not compromised by an attacker. It’s based on single use pre-calculated tokens and additional measures to prevent denial of service attacks. Unlike the alternatives, it’s not covered by patents and it can be used freely, which makes it an interesting solution in many use cases..

Publication Date
05 September 2014

security Multiparty Secure Distributed Cryptography authentication password Authenticated Key Retrieval PAKR Secret Token


Click here to download link on

Click to share this page via your favorite social network.

Learn more about defensive publications with our examples and frequently asked questions

What we are trying to do?

We are attempting to mobilize the creativity and innovative capacities of the Linux and broader open source community to codify the universe of preexisting inventions in defensive publications that upon publication in the IP.COM database will immediately serve as effective prior art that prevents anyone from having a patent issued that claims inventions that have already been document in a defensive publication. In addition to creating a vehicle to utilize this highly effective form of IP rights management for known inventions, it is hoped that the community will use defensive publications as a means of codifying future inventions should the inventors prefer not to make their invention the subject of a patent disclosure and application.