Abstract
The problems of authentication and identification have received wide interest in cryptographic research. However, there has been no satisfactory solution for the problem of authentication by a human recipient who does not use any trusted computational device, which arises for example in the context of smartcard-human interaction, in particular in the context of electronic wallets. The problem of identification is ubiquitous in communication over insecure networks.
This paper introduces visual authentication and visual identification methods, which are authentication and identification methods for human users based on visual cryptography. These methods are very natural and easy to use, and can be implemented using very common “low tech” technology. The methods we suggest are efficient in the sense that a single transparency can be used for several authentications or for several identifications. The security of these methods is rigorously analyzed.
A full version of this paper is available in [9].
Research supported by BSF Grant 32-00032.
Chapter PDF
References
Abadi M., Burrows M., Kaufman C. and Lampson B., Authentication and delegation with smart-cards, Sci. of Comp. Prog., 21 (2), Oct. 1993, 93–113.
Boly J., Bosselaers A., Cramer R., Michelsen R., Mjolsnes S., Muller F., Pedersen T., Pfitzmann B., de Rooij P., Schoenmakers B., Schunter M., Vallee L. and Waidner M., The esprit project cafe — high security digital payment system, in Computer Security — ESORICS 94, Springer-Verlag LNCS Vol. 875, 1994.
Gilbert E., MacWilliams F. and Sloane N., Codes which detect deception, Bell Sys. Tech. J., Vol. 53, No. 3, 1974, 405–424.
Gobioff H., Smith S., Tygar J. D. and Yee B., Smartcards in hostile environments, in Proc. of The 2nd USENIX Workshop on Elec. Commerce, Nov. 1996, 23–28.
Haller N. M., The S/KEY one-time password system, in Internet Soc. Symp. on Network and Dist. Sys. Sec., 1994.
Kobara K. and Imai H., Limiting the visible space visual secret sharing schemes and their application to human identification, in Asiacrypt '96, Springer-Verlag LNCS Vol. 1163, 1996, 185–195.
Matsumoto T., Human-computer cryptography: an attempt, in ACM Conf. on Comp. and Comm. Sec., ACM Press, March 1996, 68–75.
Matsumoto T. and Imai H., Human identification through insecure channel, in Eurocrypt '91, Springer-Verlag LNCS Vol. 547, 1991, 409–421.
Naor M. and Pinkas B., Visual authentication and identification, in Theory of Cryptography Library, http://theory.lcs.mit.edu/~tcryptol.
Naor M. and Shamir A., Visual cryptography, in Eurocrypt '94, Springer-Verlag LNCS Vol. 950, 1995, 1–12.
Rubin A. D., Independent one-time passwords, Computing Systems, The USENIX Association, Vol. 9, No. 1996, 15–27.
Stinson D. R., An introduction to visual cryptography, presented at Public Key Solutions '97. Available at http://bibd.unl.edu/~stinson/VCS-PKS.ps.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag
About this paper
Cite this paper
Naor, M., Pinkas, B. (1997). Visual authentication and identification. In: Kaliski, B.S. (eds) Advances in Cryptology — CRYPTO '97. CRYPTO 1997. Lecture Notes in Computer Science, vol 1294. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0052245
Download citation
DOI: https://doi.org/10.1007/BFb0052245
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63384-6
Online ISBN: 978-3-540-69528-8
eBook Packages: Springer Book Archive