Skip to main content

Stayin’ Alive: Aliveness as an Alternative to Authentication

  • Conference paper
Security Protocols XX (Security Protocols 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7622))

Included in the following conference series:

  • 969 Accesses

Abstract

Authentication protocols attempt to discern whether or not a user is who she says she is based on what she has, is or knows. In many situtations, however, such as protecting Wikis from robots and Distributed Hash Tables from sybils, identity is less important than liveness: it’s not who you are that matters, it’s whether or not you are alive. We propose extensions to the Kerberos authentication which allow systems to test whether or not they are interacting with a real person, optionally disregarding their identity. We demonstrate how such extensions could be used to support realistic user interactions with requiring shared definitions of global identity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: Using Hard AI Problems for Security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 294–311. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  2. Hartman, S., Zhu, L.: A Generalized Framework for Kerberos Pre-Authentication. RFC 6113 (April 2011)

    Google Scholar 

  3. Holt, J.E., Seamons, K.E.: Nym: Practical Pseudonymity for Anonymous Networks. Technical Report 2006-4, Internet Security Research Lab (ISRL), Brigham Young University (June 2006)

    Google Scholar 

  4. Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Communications of the ACM 21(12) (December 1978)

    Google Scholar 

  5. Neuman, B.C., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE Communications Magazine 32(9), 33–38 (1994)

    Article  Google Scholar 

  6. Neuman, C., Yu, T., Hartman, S., Raeburn, K.: The Kerberos Network Authentication Service (V5). RFC 4120 (July 2005)

    Google Scholar 

  7. Tsang, P.P., Kapadia, A., Cornelius, C., Smith, S.W.: Nymble: Blocking Misbehaving Users in Anonymizing Networks. IEEE Transactions on Dependable and Secure Computing 8(2), 256–269 (2011)

    Article  Google Scholar 

  8. Turing, A.M.: Computing Machinery and Intelligence. Mind 59, 433–460 (1950)

    Article  MathSciNet  Google Scholar 

  9. von Ahn, L.: Human Computation. Technical Report CMU-CS-05-193, Carnegie Mellon University, Pittsburgh, PA (2005)

    Google Scholar 

  10. Zhu, L., Hartman, S., Leach, P.: Anonymity Support for Kerberos. RFC 6112 (April 2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Anderson, J., Watson, R.N.M. (2012). Stayin’ Alive: Aliveness as an Alternative to Authentication. In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J. (eds) Security Protocols XX. Security Protocols 2012. Lecture Notes in Computer Science, vol 7622. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35694-0_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35694-0_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35693-3

  • Online ISBN: 978-3-642-35694-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics