skip to content
A Secure Human-Computer Authentication Scheme Preview this item
ClosePreview this item
Checking...

A Secure Human-Computer Authentication Scheme

Author: Nicholas J Hopper; Manuel Blum; CARNEGIE-MELLON UNIV PITTSBURGH PA SCHOOL OF COMPUTER SCIENCE.
Publisher: Ft. Belvoir Defense Technical Information Center MAY 2000.
Edition/Format:   eBook : English
Database:WorldCat
Summary:
We introduce a protocol for authentication between a human and a computer, where the human is able to use no special hardware other than a dumb terminal. Authentication is based on a shared secret which can be reused polynomially often with no danger of exposure, assuming the conjectured uniform hardness of learning parity functions in the presence of noise. Under this conjecture, the protocol is secure against a  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Internet resource
Document Type: Internet Resource
All Authors / Contributors: Nicholas J Hopper; Manuel Blum; CARNEGIE-MELLON UNIV PITTSBURGH PA SCHOOL OF COMPUTER SCIENCE.
OCLC Number: 227934148
Description: 8 p.

Abstract:

We introduce a protocol for authentication between a human and a computer, where the human is able to use no special hardware other than a dumb terminal. Authentication is based on a shared secret which can be reused polynomially often with no danger of exposure, assuming the conjectured uniform hardness of learning parity functions in the presence of noise. Under this conjecture, the protocol is secure against a polynomially-bounded passive adversary and also some forms of active adversary, although it is not secure against arbitrary active adversaries.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/227934148>
library:oclcnum"227934148"
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/227934148>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:contributor
schema:contributor
schema:contributor
schema:datePublished"MAY 2000"
schema:datePublished"2000"
schema:description"We introduce a protocol for authentication between a human and a computer, where the human is able to use no special hardware other than a dumb terminal. Authentication is based on a shared secret which can be reused polynomially often with no danger of exposure, assuming the conjectured uniform hardness of learning parity functions in the presence of noise. Under this conjecture, the protocol is secure against a polynomially-bounded passive adversary and also some forms of active adversary, although it is not secure against arbitrary active adversaries."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/1909382917>
schema:inLanguage"en"
schema:name"A Secure Human-Computer Authentication Scheme"@en
schema:numberOfPages"8"
schema:publisher
schema:url
schema:url<http://handle.dtic.mil/100.2/ADA382135>

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.