Human-Computer Cryptography: An Attempt

  title={Human-Computer Cryptography: An Attempt},
  author={Tsutomu Matsumoto},
  journal={Journal of Computer Security},
Can you securely prove your identity to a host computer by using no dedicated software at your terminal and no dedicated token at your hands ? Conventional password checking schemes don't need 8uch a software and hardware but have a disadvantage that an attacker who has correctly observed an input password by peeping or wiretapping can perfectly impersonate the corresponding user. Conventional dynamic (one-time) password schemes or zero-knowledge identification schemes can be securely… CONTINUE READING
Highly Cited
This paper has 81 citations. REVIEW CITATIONS

11 Figures & Tables



Citations per Year

82 Citations

Semantic Scholar estimates that this publication has 82 citations based on the available data.

See our FAQ for additional information.