Human-computer cryptography: an attempt
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Secure Human Identification Protocols
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Practice-Oriented Provable-Security
ISW '97 Proceedings of the First International Workshop on Information Security
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Déjà Vu: a user study using images for authentication
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
The design and analysis of graphical passwords
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
On the Matsumoto and Imai's human identification scheme
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Human identification through image evaluation using secret predicates
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
A new human identification protocol and coppersmith's baby-step giant-step algorithm
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Cryptanalysis of the convex hull click human identification protocol
ISC'10 Proceedings of the 13th international conference on Information security
Breaking undercover: exploiting design flaws and nonuniform human behavior
Proceedings of the Seventh Symposium on Usable Privacy and Security
Hi-index | 0.00 |
We present variations and modifications of the image-feature based human identification protocol proposed by Jameel et al with application to user authentication on mobile devices with limited display capabilities. The protocols introduced are essentially reduced versions of the original protocol with a minor tradeoff between security and usability. However, the proposed protocols are not aimed for computation and memory restrained devices. A brief user survey highlights the usability. By employing realistic assumptions pertaining to mobile devices, we show that the protocols are secure under the conjectured difficulty of extracting the secret feature from the observation of images and their binary answers. The adversary considered is strictly passive.