Reverse authentication in financial transactions

New families of protocol based on communication over human-based side channels, permit secure pairing or group formation in ways that no party has to prove its name. Rather, individuals are able to hook up devices in their possession to others that they can identify by context. We examine a model in...

Full description

Bibliographic Details
Main Authors: Roscoe, W, Bangdao, C
Format: Journal article
Published: 2010
_version_ 1797058109037871104
author Roscoe, W
Bangdao, C
author_facet Roscoe, W
Bangdao, C
author_sort Roscoe, W
collection OXFORD
description New families of protocol based on communication over human-based side channels, permit secure pairing or group formation in ways that no party has to prove its name. Rather, individuals are able to hook up devices in their possession to others that they can identify by context. We examine a model in which, to prove his or her identity to a party, the user first uses one of these ``human-interactive security protocols'' or HISPs to connect to it. Thus, when authenticating A to B, A first authenticates a channel she has to B: the reverse direction. This can be characterised as bootstrapping a secure connection using human trust. This provides new challenges to the formal modelling of trust and authentication.
first_indexed 2024-03-06T19:45:51Z
format Journal article
id oxford-uuid:22475304-395e-4114-aafa-43d4ecd62353
institution University of Oxford
last_indexed 2024-03-06T19:45:51Z
publishDate 2010
record_format dspace
spelling oxford-uuid:22475304-395e-4114-aafa-43d4ecd623532022-03-26T11:37:50ZReverse authentication in financial transactionsJournal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:22475304-395e-4114-aafa-43d4ecd62353Department of Computer Science2010Roscoe, WBangdao, CNew families of protocol based on communication over human-based side channels, permit secure pairing or group formation in ways that no party has to prove its name. Rather, individuals are able to hook up devices in their possession to others that they can identify by context. We examine a model in which, to prove his or her identity to a party, the user first uses one of these ``human-interactive security protocols'' or HISPs to connect to it. Thus, when authenticating A to B, A first authenticates a channel she has to B: the reverse direction. This can be characterised as bootstrapping a secure connection using human trust. This provides new challenges to the formal modelling of trust and authentication.
spellingShingle Roscoe, W
Bangdao, C
Reverse authentication in financial transactions
title Reverse authentication in financial transactions
title_full Reverse authentication in financial transactions
title_fullStr Reverse authentication in financial transactions
title_full_unstemmed Reverse authentication in financial transactions
title_short Reverse authentication in financial transactions
title_sort reverse authentication in financial transactions
work_keys_str_mv AT roscoew reverseauthenticationinfinancialtransactions
AT bangdaoc reverseauthenticationinfinancialtransactions