2012
DOI: 10.1007/978-3-642-29101-2_13
|View full text |Cite
|
Sign up to set email alerts
|

High-Entropy Visual Identification for Touch Screen Devices

Abstract: Abstract. We exhibit a system for improving the quality of user-derived keying material on touchscreen devices. We allow a device to recover previously generated, highly entropic data suitable for use as (part of) a strong secret key from a user's act of identifying to the device. Our system uses visual cryptography [22], using no additional electronics and no memorization on the part of the user. Instead, we require the use of a transparency overlaid on the touch-screen. Our scheme is similar to the identific… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 20 publications
(36 reference statements)
0
3
0
Order By: Relevance
“…However, we assume that the adversary does not have control over the authentication device while the user authenticates (e.g., by installing malware). We also assume an adversary with incomplete surveillance [19], i.e., who can physically observe the victim during authentication but cannot capture the details of the secret object.…”
Section: Adversary Modelmentioning
confidence: 99%
“…However, we assume that the adversary does not have control over the authentication device while the user authenticates (e.g., by installing malware). We also assume an adversary with incomplete surveillance [19], i.e., who can physically observe the victim during authentication but cannot capture the details of the secret object.…”
Section: Adversary Modelmentioning
confidence: 99%
“…In the spirit of stacking a physical share onto a digital one, [4] propose an application in an alternative to mobile phone passwords, instead stacking a VC transparency onto the screen displaying the accompanying share in a (2, 2)-VCS.…”
Section: Related Workmentioning
confidence: 99%
“…When the customer attempts to log in to an online account and switches on the device, both the server and device use a secret formula, based on current time and credentials, to generate an eight-digit code the customer inputs to access the account. This is regarded as secure, as it relies on "something you have", versus knowledge alone, which due to its ethereal nature can more easily fall into the wrong hands [4]. Hence, it provides greater security.…”
Section: Real-world Applicationsmentioning
confidence: 99%