Revocation and reissuing of compromised credentials is impossible for which of the following authentication techniques?