This login authentication example shows how an item of data can ... the real password would not be present. See hash and zero-knowledge proof. THIS DEFINITION IS FOR PERSONAL USE ONLY.