Reverse Authentication in Financial Transactions and Identity Management

New families of protocol, based on communication over human-based side channels, permit secure pairing or group formation in ways such that no party has to prove its name. Rather, individuals are able to hook up devices in their possession to others that they can identify by context. We examine a mo...

Full description

Bibliographic Details
Main Authors: Chen, B, Nguyen, L, Roscoe, A
Format: Journal article
Published: 2013
_version_ 1797053582966521856
author Chen, B
Nguyen, L
Roscoe, A
author_facet Chen, B
Nguyen, L
Roscoe, A
author_sort Chen, B
collection OXFORD
description New families of protocol, based on communication over human-based side channels, permit secure pairing or group formation in ways such that no party has to prove its name. Rather, individuals are able to hook up devices in their possession to others that they can identify by context. We examine a model in which, to prove his or her identity to a party, the user first uses one of these "human-interactive security protocols" or HISPs to connect to it. Thus, when authenticating A to B, A first authenticates a channel she has to B: the reverse direction. This can be characterised as bootstrapping a secure connection using human trust. This provides new challenges to the formal modelling of trust and authentication. © 2012 Springer Science+Business Media, LLC.
first_indexed 2024-03-06T18:45:41Z
format Journal article
id oxford-uuid:0e6d7210-4e4f-4386-a335-18d06b2149cc
institution University of Oxford
last_indexed 2024-03-06T18:45:41Z
publishDate 2013
record_format dspace
spelling oxford-uuid:0e6d7210-4e4f-4386-a335-18d06b2149cc2022-03-26T09:45:54ZReverse Authentication in Financial Transactions and Identity ManagementJournal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:0e6d7210-4e4f-4386-a335-18d06b2149ccSymplectic Elements at Oxford2013Chen, BNguyen, LRoscoe, ANew families of protocol, based on communication over human-based side channels, permit secure pairing or group formation in ways such that no party has to prove its name. Rather, individuals are able to hook up devices in their possession to others that they can identify by context. We examine a model in which, to prove his or her identity to a party, the user first uses one of these "human-interactive security protocols" or HISPs to connect to it. Thus, when authenticating A to B, A first authenticates a channel she has to B: the reverse direction. This can be characterised as bootstrapping a secure connection using human trust. This provides new challenges to the formal modelling of trust and authentication. © 2012 Springer Science+Business Media, LLC.
spellingShingle Chen, B
Nguyen, L
Roscoe, A
Reverse Authentication in Financial Transactions and Identity Management
title Reverse Authentication in Financial Transactions and Identity Management
title_full Reverse Authentication in Financial Transactions and Identity Management
title_fullStr Reverse Authentication in Financial Transactions and Identity Management
title_full_unstemmed Reverse Authentication in Financial Transactions and Identity Management
title_short Reverse Authentication in Financial Transactions and Identity Management
title_sort reverse authentication in financial transactions and identity management
work_keys_str_mv AT chenb reverseauthenticationinfinancialtransactionsandidentitymanagement
AT nguyenl reverseauthenticationinfinancialtransactionsandidentitymanagement
AT roscoea reverseauthenticationinfinancialtransactionsandidentitymanagement