skip to content
A secure human-computer authentication scheme Preview this item
ClosePreview this item
Checking...

A secure human-computer authentication scheme

Author: Nicholas J Hopper; Manuel Blum
Publisher: Pittsburgh, Pa. : School of Computer Science, Carnegie Mellon University, [2000].
Series: Research paper (Carnegie Mellon University. School of Computer Science), CMU-CS-00-139.
Edition/Format:   Book : English
Database:WorldCat
Summary:
Abstract: "We introduce a protocol for authentication between a human and a computer, where the human is able to use no special hardware other than a dumb terminal. Authentication is based on a shared secret which can be reused polynomially often with no danger of exposure, assuming the conjectured uniform hardness of learning parity functions in the presence of noise. Under this conjecture, the protocol is secure  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Nicholas J Hopper; Manuel Blum
OCLC Number: 314159734
Notes: "May 2000."
Description: 6 leaves ; 28 cm.
Series Title: Research paper (Carnegie Mellon University. School of Computer Science), CMU-CS-00-139.
Responsibility: Nicholas J. Hopper, Manuel Blum.

Abstract:

Abstract: "We introduce a protocol for authentication between a human and a computer, where the human is able to use no special hardware other than a dumb terminal. Authentication is based on a shared secret which can be reused polynomially often with no danger of exposure, assuming the conjectured uniform hardness of learning parity functions in the presence of noise. Under this conjecture, the protocol is secure against a polynomially-bounded passive adversary and also some forms of active adversary, although it is not secure against arbitrary active adversaries."

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/314159734>
library:oclcnum"314159734"
library:placeOfPublication
library:placeOfPublication
rdf:typeschema:MediaObject
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:contributor
schema:creator
schema:datePublished"2000"
schema:description"Abstract: "We introduce a protocol for authentication between a human and a computer, where the human is able to use no special hardware other than a dumb terminal. Authentication is based on a shared secret which can be reused polynomially often with no danger of exposure, assuming the conjectured uniform hardness of learning parity functions in the presence of noise. Under this conjecture, the protocol is secure against a polynomially-bounded passive adversary and also some forms of active adversary, although it is not secure against arbitrary active adversaries.""
schema:exampleOfWork<http://worldcat.org/entity/work/id/137572666>
schema:inLanguage"en"
schema:isPartOf
schema:name"A secure human-computer authentication scheme"
schema:publication
schema:publisher
wdrs:describedby

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.