Human Identification Through Insecure Channel

  • Tsutomu Matsumoto
  • Hideki Imai
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 547)


This paper examines a relatively new problem of how to securely identify a human through an insecure channel. It proposes a simple but powerful cryptographic scheme that fits human ability of memorizing and processing. Typical applications of the scheme are the identification verification of an user at an on-line terminal of a central computer or holder verification done by an IC card which can communicate its holder only through an equipment like an automatic vendor machine.


Identification Verification Human Identification User Identification Authentication Cryptography Access Control Password IC Card Smart Card Insecure Channel Human Interface 


  1. [1]
    D. W. Davies and W. L. Price, Security for Computer Networks, Chapter 7, John Wiley & Sons, 1984.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1991

Authors and Affiliations

  • Tsutomu Matsumoto
    • 1
  • Hideki Imai
    • 1
  1. 1.Division of Electrical and Computer EngineeringYokohama National UniversityHodogaya, YokohamaJapan

Personalised recommendations