Secure human identification protocols

One interesting and important challenge for the cryptologic community is that of providing secure authentication and identification for unassisted humans. There are a range of protocols for secure identification which require various forms of trusted hardware or software, aimed at protecting privacy and financial assets. But how do we verify our identity, securely, when we don’t have or don’t trust our smart card, palmtop, or laptop? In this paper, we provide definitions of what we believe to be reasonable goals for secure human identification. We demonstrate that existing solutions do not meet these reasonable definitions. Finally, we provide solutions which demonstrate the feasibility of the security conditions attached to our definitions, but which are impractical for use by humans.

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2248
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other7th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001
Country/TerritoryAustralia
CityGold Coast
Period 12/9/01 → 12/13/01

Bibliographical note

Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 2001.

Publisher link

Find It

Other files and links

Fingerprint

Dive into the research topics of 'Secure human identification protocols'. Together they form a unique fingerprint.

Cite this

Secure human identification protocols. / Hopper, Nicholas J. ; Blum, Manuel.
Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. ed. / Colin Boyd. Springer Verlag, 2001. p. 52-66 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2248).

Research output : Chapter in Book/Report/Conference proceeding › Conference contribution

Hopper, NJ & Blum, M 2001, Secure human identification protocols . in C Boyd (ed.), Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 2248, Springer Verlag, pp. 52-66, 7th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001, Gold Coast, Australia, 12/9/01 . https://doi.org/10.1007/3-540-45682-1_4

Hopper NJ , Blum M. Secure human identification protocols . In Boyd C, editor, Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer Verlag. 2001. p. 52-66. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). doi: 10.1007/3-540-45682-1_4

Hopper, Nicholas J. ; Blum, Manuel. / Secure human identification protocols . Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. editor / Colin Boyd. Springer Verlag, 2001. pp. 52-66 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).

@inproceedings<2639a46a17c14378a050b6f1e13a90c9, title = "Secure human identification protocols",

abstract = "One interesting and important challenge for the cryptologic community is that of providing secure authentication and identification for unassisted humans. There are a range of protocols for secure identification which require various forms of trusted hardware or software, aimed at protecting privacy and financial assets. But how do we verify our identity, securely, when we dont have or dont trust our smart card, palmtop, or laptop? In this paper, we provide definitions of what we believe to be reasonable goals for secure human identification. We demonstrate that existing solutions do not meet these reasonable definitions. Finally, we provide solutions which demonstrate the feasibility of the security conditions attached to our definitions, but which are impractical for use by humans.",

author = "Hopper, and Manuel Blum",

note = "Publisher Copyright: Springer-Verlag Berlin Heidelberg 2001.; 7th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001 ; Conference date: 09-12-2001 Through 13-12-2001",

year = "2001", doi = "10.1007/3-540-45682-1_4", language = "English (US)", isbn = "3540429875",

series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

publisher = "Springer Verlag", pages = "52--66", editor = "Colin Boyd",

booktitle = "Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings",

T1 - Secure human identification protocols

AU - Hopper, Nicholas J.

AU - Blum, Manuel

N1 - Publisher Copyright: © Springer-Verlag Berlin Heidelberg 2001.

N2 - One interesting and important challenge for the cryptologic community is that of providing secure authentication and identification for unassisted humans. There are a range of protocols for secure identification which require various forms of trusted hardware or software, aimed at protecting privacy and financial assets. But how do we verify our identity, securely, when we don’t have or don’t trust our smart card, palmtop, or laptop? In this paper, we provide definitions of what we believe to be reasonable goals for secure human identification. We demonstrate that existing solutions do not meet these reasonable definitions. Finally, we provide solutions which demonstrate the feasibility of the security conditions attached to our definitions, but which are impractical for use by humans.

AB - One interesting and important challenge for the cryptologic community is that of providing secure authentication and identification for unassisted humans. There are a range of protocols for secure identification which require various forms of trusted hardware or software, aimed at protecting privacy and financial assets. But how do we verify our identity, securely, when we don’t have or don’t trust our smart card, palmtop, or laptop? In this paper, we provide definitions of what we believe to be reasonable goals for secure human identification. We demonstrate that existing solutions do not meet these reasonable definitions. Finally, we provide solutions which demonstrate the feasibility of the security conditions attached to our definitions, but which are impractical for use by humans.

M3 - Conference contribution

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

BT - Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings

PB - Springer Verlag

T2 - 7th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001

Y2 - 9 December 2001 through 13 December 2001