Abstract
This paper examines a relatively new problem of how to securely identify a human through an insecure channel. It proposes a simple but powerful cryptographic scheme that fits human ability of memorizing and processing. Typical applications of the scheme are the identification verification of an user at an on-line terminal of a central computer or holder verification done by an IC card which can communicate its holder only through an equipment like an automatic vendor machine.
Chapter PDF
Similar content being viewed by others
Keywords
Reference
D. W. Davies and W. L. Price, Security for Computer Networks, Chapter 7, John Wiley & Sons, 1984.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1991 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Matsumoto, T., Imai, H. (1991). Human Identification Through Insecure Channel. In: Davies, D.W. (eds) Advances in Cryptology — EUROCRYPT ’91. EUROCRYPT 1991. Lecture Notes in Computer Science, vol 547. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46416-6_35
Download citation
DOI: https://doi.org/10.1007/3-540-46416-6_35
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-54620-7
Online ISBN: 978-3-540-46416-7
eBook Packages: Springer Book Archive