One interesting and important challenge for the cryptologic community is that of providing secure authentication and identification for unassisted humans. There are a range of protocols for secure identification which require various forms of trusted hardware or software, aimed at protecting privacy and financial assets. But how do we verify our identity, securely, when we don’t have or don’t trust our smart card, palmtop, or laptop? In this paper, we provide definitions of what we believe to be reasonable goals for secure human identification. We demonstrate that existing solutions do not meet these reasonable definitions. Finally, we provide solutions which demonstrate the feasibility of the security conditions attached to our definitions, but which are impractical for use by humans.
|Original language||English (US)|
|Title of host publication||Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings|
|Number of pages||15|
|ISBN (Print)||3540429875, 9783540429876|
|State||Published - 2001|
|Event||7th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001 - Gold Coast, Australia|
Duration: Dec 9 2001 → Dec 13 2001
|Name||Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)|
|Other||7th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001|
|Period||12/9/01 → 12/13/01|
Bibliographical notePublisher Copyright:
© Springer-Verlag Berlin Heidelberg 2001.