Computer Science – Cryptography and Security
Scientific paper
2007-04-18
Computer Science
Cryptography and Security
24 pages, 8 figures
Scientific paper
A secure human identification protocol aims at authenticating human users to a remote server when even the users' inputs are not hidden from an adversary. Recently, the authors proposed a human identification protocol in the RSA Conference 2007, which is loosely based on the ability of humans to efficiently process an image. The advantage being that an automated adversary is not effective in attacking the protocol without human assistance. This paper extends that work by trying to solve some of the open problems. First, we analyze the complexity of defeating the proposed protocols by quantifying the workload of a human adversary. Secondly, we propose a new construction based on textual CAPTCHAs (Reverse Turing Tests) in order to make the generation of automated challenges easier. We also present a brief experiment involving real human users to find out the number of possible attributes in a given image and give some guidelines for the selection of challenge questions based on the results. Finally, we analyze the previously proposed protocol in detail for the relationship between the secrets. Our results show that we can construct human identification protocols based on image evaluation with reasonably ``quantified'' security guarantees based on our model.
Jameel Hassan
Lee Heejo
Lee Sungyoung
No associations
LandOfFree
Using Image Attributes for Human Identification Protocols does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Using Image Attributes for Human Identification Protocols, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Using Image Attributes for Human Identification Protocols will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-404846