A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Towards Human Computable Passwords
2017
Innovations in Theoretical Computer Science
An interesting challenge for the cryptography community is to design authentication protocols that are so simple that a human can execute them without relying on a fully trusted computer. We propose several candidate authentication protocols for a setting in which the human user can only receive assistance from a semi-trusted computer -a computer that stores information and performs computations correctly but does not provide confidentiality. Our schemes use a semitrusted computer to store and
doi:10.4230/lipics.itcs.2017.10
dblp:conf/innovations/Blocki0DV17
fatcat:4f57vbaywrd4fniuzb2t4fa2y4