How OPAQUE works:
A) Both the server and the client hold information necessary for client authentication, but neither one of them has enough for validation / authentication (at the onset)
B) Client has password / server has the salt ; server then sends the salt over to the client for a joint computation. This is referred to as the oblivious PRF.
With just that exchange of information, the client is able to authenticate. If you want to know the sorcery behind why this is the case, then visit the link that was published above and also make sure to go ahead and visit the first whitepaper published detailing the idea: https://eprint.iacr.org/2018/163.pdf
Claims to be 'aPAKE' security.
Authors state:
"We formalize this notion in the Universally Composable (UC) settings and present two modular constructions using an Oblivious PRF as a main tool..."
>>Click here to continue<<
