TY - GEN
T1 - Secure human identification protocols
AU - Hopper, Nicholas J.
AU - Blum, Manuel
N1 - Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 2001.
Copyright:
Copyright 2020 Elsevier B.V., All rights reserved.
PY - 2001
Y1 - 2001
N2 - One interesting and important challenge for the cryptologic community is that of providing secure authentication and identification for unassisted humans. There are a range of protocols for secure identification which require various forms of trusted hardware or software, aimed at protecting privacy and financial assets. But how do we verify our identity, securely, when we don’t have or don’t trust our smart card, palmtop, or laptop? In this paper, we provide definitions of what we believe to be reasonable goals for secure human identification. We demonstrate that existing solutions do not meet these reasonable definitions. Finally, we provide solutions which demonstrate the feasibility of the security conditions attached to our definitions, but which are impractical for use by humans.
AB - One interesting and important challenge for the cryptologic community is that of providing secure authentication and identification for unassisted humans. There are a range of protocols for secure identification which require various forms of trusted hardware or software, aimed at protecting privacy and financial assets. But how do we verify our identity, securely, when we don’t have or don’t trust our smart card, palmtop, or laptop? In this paper, we provide definitions of what we believe to be reasonable goals for secure human identification. We demonstrate that existing solutions do not meet these reasonable definitions. Finally, we provide solutions which demonstrate the feasibility of the security conditions attached to our definitions, but which are impractical for use by humans.
UR - http://www.scopus.com/inward/record.url?scp=70349284581&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=70349284581&partnerID=8YFLogxK
U2 - 10.1007/3-540-45682-1_4
DO - 10.1007/3-540-45682-1_4
M3 - Conference contribution
AN - SCOPUS:70349284581
SN - 3540429875
SN - 9783540429876
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 52
EP - 66
BT - Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
A2 - Boyd, Colin
PB - Springer Verlag
T2 - 7th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001
Y2 - 9 December 2001 through 13 December 2001
ER -