Cryptographic protocols and system aspects for practical data-minimizing authentication door