Secure human identification protocols

Nicholas J. Hopper, Manuel Blum

Research output: Chapter in Book/Report/Conference proceedingConference contribution

365 Scopus citations

Abstract

One interesting and important challenge for the cryptologic community is that of providing secure authentication and identification for unassisted humans. There are a range of protocols for secure identification which require various forms of trusted hardware or software, aimed at protecting privacy and financial assets. But how do we verify our identity, securely, when we don’t have or don’t trust our smart card, palmtop, or laptop? In this paper, we provide definitions of what we believe to be reasonable goals for secure human identification. We demonstrate that existing solutions do not meet these reasonable definitions. Finally, we provide solutions which demonstrate the feasibility of the security conditions attached to our definitions, but which are impractical for use by humans.

Original languageEnglish (US)
Title of host publicationAdvances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
EditorsColin Boyd
PublisherSpringer Verlag
Pages52-66
Number of pages15
ISBN (Print)3540429875, 9783540429876
DOIs
StatePublished - 2001
Event7th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001 - Gold Coast, Australia
Duration: Dec 9 2001Dec 13 2001

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2248
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other7th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001
CountryAustralia
CityGold Coast
Period12/9/0112/13/01

Fingerprint Dive into the research topics of 'Secure human identification protocols'. Together they form a unique fingerprint.

Cite this