Skip to main content

Introduction, Scenario, and Related Work

  • Chapter
  • First Online:
Authentication in Insecure Environments
  • 461 Accesses

Abstract

Most cryptographic primitives for authentication schemes in the digital world are based on the knowledge of a private key or secret, for example digital signatures or zero-knowledge proofs. In many cases there is an (at least) implicit binding of the secret to a person. If you receive a signed mail, you assume it is signed by the regular owner of the private key; if you authenticate yourself with a zero-knowledge proof, you are expected not to give the secret to another person. On the other hand, one may not put too many trust into this assumption since this secrets are eventually digital data which can be copied without evidence. Two obvious situations come to one’s mind: On the one hand, cryptographic secrets are not very memorisable for human beings in general, so they are usually stored somewhere, where they could be stolen. On the other hand, the user may want to share his secret with somebody while the authorising organisation does not want him to do so.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sebastian Pape .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Fachmedien Wiesbaden

About this chapter

Cite this chapter

Pape, S. (2014). Introduction, Scenario, and Related Work. In: Authentication in Insecure Environments. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-07116-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-07116-5_7

  • Published:

  • Publisher Name: Springer Vieweg, Wiesbaden

  • Print ISBN: 978-3-658-07115-8

  • Online ISBN: 978-3-658-07116-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics