Stayin’ Alive: Aliveness as an Alternative to Authentication
Authentication protocols attempt to discern whether or not a user is who she says she is based on what she has, is or knows. In many situtations, however, such as protecting Wikis from robots and Distributed Hash Tables from sybils, identity is less important than liveness: it’s not who you are that matters, it’s whether or not you are alive. We propose extensions to the Kerberos authentication which allow systems to test whether or not they are interacting with a real person, optionally disregarding their identity. We demonstrate how such extensions could be used to support realistic user interactions with requiring shared definitions of global identity.
KeywordsHash Table Authentication Protocol Security Protocol Authentication Service Anonymous User
Unable to display preview. Download preview PDF.
- 2.Hartman, S., Zhu, L.: A Generalized Framework for Kerberos Pre-Authentication. RFC 6113 (April 2011)Google Scholar
- 3.Holt, J.E., Seamons, K.E.: Nym: Practical Pseudonymity for Anonymous Networks. Technical Report 2006-4, Internet Security Research Lab (ISRL), Brigham Young University (June 2006)Google Scholar
- 4.Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Communications of the ACM 21(12) (December 1978)Google Scholar
- 6.Neuman, C., Yu, T., Hartman, S., Raeburn, K.: The Kerberos Network Authentication Service (V5). RFC 4120 (July 2005)Google Scholar
- 9.von Ahn, L.: Human Computation. Technical Report CMU-CS-05-193, Carnegie Mellon University, Pittsburgh, PA (2005)Google Scholar
- 10.Zhu, L., Hartman, S., Leach, P.: Anonymity Support for Kerberos. RFC 6112 (April 2011)Google Scholar