Journal article icon

Journal article

Reverse Authentication in Financial Transactions and Identity Management

Abstract:
New families of protocol, based on communication over human-based side channels, permit secure pairing or group formation in ways such that no party has to prove its name. Rather, individuals are able to hook up devices in their possession to others that they can identify by context. We examine a model in which, to prove his or her identity to a party, the user first uses one of these "human-interactive security protocols" or HISPs to connect to it. Thus, when authenticating A to B, A first authenticates a channel she has to B: the reverse direction. This can be characterised as bootstrapping a secure connection using human trust. This provides new challenges to the formal modelling of trust and authentication. © 2012 Springer Science+Business Media, LLC.
Publication status:
Published

Actions


Access Document


Publisher copy:
10.1007/s11036-012-0366-2

Authors



Journal:
MOBILE NETWORKS and APPLICATIONS More from this journal
Volume:
18
Issue:
5
Pages:
712-727
Publication date:
2013-10-01
DOI:
EISSN:
1572-8153
ISSN:
1383-469X


Keywords:
Pubs id:
pubs:323342
UUID:
uuid:0e6d7210-4e4f-4386-a335-18d06b2149cc
Local pid:
pubs:323342
Source identifiers:
323342
Deposit date:
2012-12-19

Terms of use



Views and Downloads






If you are the owner of this record, you can report an update to it here: Report update to this record

TO TOP