Skip to Main content Skip to Navigation
Conference papers

Post-Session Authentication

Abstract : Entity authentication provides confidence in the claimed identity of a peer entity, but the manner in which this goal is achieved results in different types of authentication. An important factor in this regard is the order between authentication and the execution of the associated session. In this paper, we consider the case of post-session authentication, where parties authenticate each other at the end of their interactive session. This use of authentication is different from session-less authentication (e.g., in RFID) and pre-session authentication (e.g., for access control.)Post-session authentication, although a new term, is not a new concept; it is the basis of at least a few practical schemes. We, for the first time, systematically study it and present the underlying authentication model. Further, we show that an important class of problems is solvable using post-session authentication as the only setup assumption. We hope post-session authentication can be used to devise new strategies for building trust among strangers.
Document type :
Conference papers
Complete list of metadata

Cited literature [25 references]  Display  Hide  Download

https://hal.inria.fr/hal-01517658
Contributor : Hal Ifip <>
Submitted on : Wednesday, May 3, 2017 - 2:49:14 PM
Last modification on : Wednesday, May 3, 2017 - 2:52:07 PM
Long-term archiving on: : Friday, August 4, 2017 - 1:33:34 PM

File

978-3-642-29852-3_8_Chapter.pd...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Naveed Ahmed, Christian Jensen. Post-Session Authentication. 6th International Conference on Trust Management (TM), May 2012, Surat, India. pp.113-128, ⟨10.1007/978-3-642-29852-3_8⟩. ⟨hal-01517658⟩

Share

Metrics

Record views

98

Files downloads

220