Reverse Authentication in Financial Transactions and Identity Management
New families of protocol, based on communication over human-based side channels, permit secure pairing or group formation in ways such that no party has to prove its name. Rather, individuals are able to hook up devices in their possession to others that they can identify by context. We examine a mo...
Main Authors: | , , |
---|---|
Format: | Journal article |
Published: |
2013
|
_version_ | 1797053582966521856 |
---|---|
author | Chen, B Nguyen, L Roscoe, A |
author_facet | Chen, B Nguyen, L Roscoe, A |
author_sort | Chen, B |
collection | OXFORD |
description | New families of protocol, based on communication over human-based side channels, permit secure pairing or group formation in ways such that no party has to prove its name. Rather, individuals are able to hook up devices in their possession to others that they can identify by context. We examine a model in which, to prove his or her identity to a party, the user first uses one of these "human-interactive security protocols" or HISPs to connect to it. Thus, when authenticating A to B, A first authenticates a channel she has to B: the reverse direction. This can be characterised as bootstrapping a secure connection using human trust. This provides new challenges to the formal modelling of trust and authentication. © 2012 Springer Science+Business Media, LLC. |
first_indexed | 2024-03-06T18:45:41Z |
format | Journal article |
id | oxford-uuid:0e6d7210-4e4f-4386-a335-18d06b2149cc |
institution | University of Oxford |
last_indexed | 2024-03-06T18:45:41Z |
publishDate | 2013 |
record_format | dspace |
spelling | oxford-uuid:0e6d7210-4e4f-4386-a335-18d06b2149cc2022-03-26T09:45:54ZReverse Authentication in Financial Transactions and Identity ManagementJournal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:0e6d7210-4e4f-4386-a335-18d06b2149ccSymplectic Elements at Oxford2013Chen, BNguyen, LRoscoe, ANew families of protocol, based on communication over human-based side channels, permit secure pairing or group formation in ways such that no party has to prove its name. Rather, individuals are able to hook up devices in their possession to others that they can identify by context. We examine a model in which, to prove his or her identity to a party, the user first uses one of these "human-interactive security protocols" or HISPs to connect to it. Thus, when authenticating A to B, A first authenticates a channel she has to B: the reverse direction. This can be characterised as bootstrapping a secure connection using human trust. This provides new challenges to the formal modelling of trust and authentication. © 2012 Springer Science+Business Media, LLC. |
spellingShingle | Chen, B Nguyen, L Roscoe, A Reverse Authentication in Financial Transactions and Identity Management |
title | Reverse Authentication in Financial Transactions and Identity Management |
title_full | Reverse Authentication in Financial Transactions and Identity Management |
title_fullStr | Reverse Authentication in Financial Transactions and Identity Management |
title_full_unstemmed | Reverse Authentication in Financial Transactions and Identity Management |
title_short | Reverse Authentication in Financial Transactions and Identity Management |
title_sort | reverse authentication in financial transactions and identity management |
work_keys_str_mv | AT chenb reverseauthenticationinfinancialtransactionsandidentitymanagement AT nguyenl reverseauthenticationinfinancialtransactionsandidentitymanagement AT roscoea reverseauthenticationinfinancialtransactionsandidentitymanagement |