I. Introduction
Password-only authentication (PoA), which has great advantages on usability and deployability, is one of the most popular online authentication methods [1]. It has been attracting attentions from academia, and recently many research works have been proposed in this field [2], [3], [4]. But PoA does easily suffer from password leakage. Billions of personal and business passwords have been compromised by hackers [5] which yields a considerable amount of users’ privacy leakage and financial loss, for example, Yahoo made 3 billion accounts exposed [6] and it finally agreed to settle for 117.5 million US dollars [7]. The password leakage, in practice, may be caused by: 1) active external attacks (e.g., SQL injection), or 2) the internal design flaws and software bugs (for instance, GitHub records passwords in plaintext [8]). It is not trivial to handle these attacks in the context of PoA.