Abstract
Most cryptographic primitives for authentication schemes in the digital world are based on the knowledge of a private key or secret, for example digital signatures or zero-knowledge proofs. In many cases there is an (at least) implicit binding of the secret to a person. If you receive a signed mail, you assume it is signed by the regular owner of the private key; if you authenticate yourself with a zero-knowledge proof, you are expected not to give the secret to another person. On the other hand, one may not put too many trust into this assumption since this secrets are eventually digital data which can be copied without evidence. Two obvious situations come to one’s mind: On the one hand, cryptographic secrets are not very memorisable for human beings in general, so they are usually stored somewhere, where they could be stolen. On the other hand, the user may want to share his secret with somebody while the authorising organisation does not want him to do so.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2014 Springer Fachmedien Wiesbaden
About this chapter
Cite this chapter
Pape, S. (2014). Introduction, Scenario, and Related Work. In: Authentication in Insecure Environments. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-07116-5_7
Download citation
DOI: https://doi.org/10.1007/978-3-658-07116-5_7
Published:
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-07115-8
Online ISBN: 978-3-658-07116-5
eBook Packages: Computer ScienceComputer Science (R0)