Human-Computer Cryptography: An Attempt

@article{Matsumoto1996HumanComputerCA,
  title={Human-Computer Cryptography: An Attempt},
  author={Tsutomu Matsumoto},
  journal={Journal of Computer Security},
  year={1996},
  volume={6},
  pages={129-150}
}
Can you securely prove your identity to a host computer by using no dedicated software at your terminal and no dedicated token at your hands ? Conventional password checking schemes don't need 8uch a software and hardware but have a disadvantage that an attacker who has correctly observed an input password by peeping or wiretapping can perfectly impersonate the corresponding user. Conventional dynamic (one-time) password schemes or zero-knowledge identification schemes can be securely… CONTINUE READING
Highly Cited
This paper has 81 citations. REVIEW CITATIONS

11 Figures & Tables

Topics

Statistics

051015'02'04'06'08'10'12'14'16'18
Citations per Year

82 Citations

Semantic Scholar estimates that this publication has 82 citations based on the available data.

See our FAQ for additional information.