Human Identification Through Insecure Channel
This paper examines a relatively new problem of how to securely identify a human through an insecure channel. It proposes a simple but powerful cryptographic scheme that fits human ability of memorizing and processing. Typical applications of the scheme are the identification verification of an user at an on-line terminal of a central computer or holder verification done by an IC card which can communicate its holder only through an equipment like an automatic vendor machine.
KeywordsIdentification Verification Human Identification User Identification Authentication Cryptography Access Control Password IC Card Smart Card Insecure Channel Human Interface
- D. W. Davies and W. L. Price, Security for Computer Networks, Chapter 7, John Wiley & Sons, 1984.Google Scholar