Practical Human-Machine Identification over Insecure Channels

نویسندگان

  • Xiang-Yang Li
  • Shang-Hua Teng
چکیده

Human-machine identiication is an important problem in cryptography that has applications in network access, electronic commerce, and smart-card design. It is a hard problem largely because human users have a very limited capacity in memorizing secrets and in performing protocols. Therefore, in addition to the requirement that a human-machine identiication scheme must be provably secure, the scheme has to be practical in the sense that it must be feasible for a human user to participate. In this paper, we develop a new scheme for this problem. Our scheme improves upon some of the previously proposed human-machine identiication schemes. We present a vigorous security analysis of our scheme. We also present some attacks to show previously proposed schemes could be vulnerable.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identification areas with inundation potential for urban runoff harvesting using the support vector machine model

     Rainfall-runoff from urban areas is one of the available water resources, which is wasted due to lack of attention and proper management. Besides, urban runoff excess of drains capacity causing many problems including inundation and urban environmental pollution. Therefore, harvesting this runoff can provide a part of the required water in urban areas, and also reduce flood and urban inund...

متن کامل

Human errors identification in operation of meat grinder using TAFEI technique

  Background: Human error is the most important cause of occupational and non-occupational accidents. Because, it seems necessary to identify, predict and analyze human errors, and also offer appropriate control strategies to reduce errors which cause adverse consequences, the present study was carried out with the aim of identifying human errors while operating meat grinder and offer sugg...

متن کامل

Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI

This paper focuses on human-computer identification systems against peeping attacks, in which adversaries can observe (and even control) interactions between humans (provers) and computers (verifiers). Real cases on peeping attacks were reported by Ross J. Anderson ten years before. Fixed passwords are insecure to peeping attacks since adversaries can simply replay the observed passwords. Some ...

متن کامل

Temperature-dependent model of human cardiac sodium channel

Cardiac sodium channels are integral membrane proteins whose structure is not known at atomic level yet and their molecular kinetics is still being studied through mathematical modeling. This study has focused on adapting an existing model of cardiac Na channel to analyze molecular kinetics of channels at 9-37°C. Irvine et al developed a Markov model for Na channel using Neuronal Network Model ...

متن کامل

Temperature-dependent model of human cardiac sodium channel

Cardiac sodium channels are integral membrane proteins whose structure is not known at atomic level yet and their molecular kinetics is still being studied through mathematical modeling. This study has focused on adapting an existing model of cardiac Na channel to analyze molecular kinetics of channels at 9-37°C. Irvine et al developed a Markov model for Na channel using Neuronal Network Model ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Comb. Optim.

دوره 3  شماره 

صفحات  -

تاریخ انتشار 1999