A Technique for Remote AuthenticationReport
Distributed systems have long relied on shared secrets to ensure the authenticity of principals. Public key systems and zero knowledge proofs of identity have reduced this reliance. We offer a method of remote authentication that can be used with no advance shared knowledge by parties, and that allows parties to increase their confidence in the authenticity of a suspicious party to an arbitrary level.
Note: Abstract extracted from PDF text
All rights reserved (no additional license for public reuse)
Wulf, William, Alec Yasinsac, Katie Oliver, and Ramesh Peri. "A Technique for Remote Authentication." University of Virginia Dept. of Computer Science Tech Report (1993).
University of Virginia, Department of Computer Science