Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation | IEEE Journals & Magazine | IEEE Xplore