Corpus ID: 5033043

Human Computable Passwords

@article{Blocki2014HumanCP,
  title={Human Computable Passwords},
  author={J. Blocki and M. Blum and A. Datta},
  journal={ArXiv},
  year={2014},
  volume={abs/1404.0024}
}
  • J. Blocki, M. Blum, A. Datta
  • Published 2014
  • Computer Science, Mathematics
  • ArXiv
  • An interesting challenge for the cryptography community is to design authentication protocols that are so simple that a human can execute them without relying on a fully trusted computer. We propose several candidate authentication protocols for a setting in which the human user can only receive assistance from a semi-trusted computer --- a computer that stores information and performs computations correctly but does not provide confidentiality. Our schemes use a semi-trusted computer to store… CONTINUE READING
    12 Citations
    Towards Human Computable Passwords
    • 9
    • PDF
    Human-Usable Password Schemas: Beyond Information-Theoretic Security
    Usable Human Authentication: A Quantitative Treatment
    • 7
    • PDF
    On the Economics of Offline Password Cracking
    • 29
    • PDF
    When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack
    • 1
    • PDF
    Human Computable Passwords - Design and Analysis.
    A Neural Attack Model for Cracking Passwords in Adversarial Environments
    • 1
    Usability of Humanly Computable Passwords
    • 4
    • PDF

    References

    SHOWING 1-10 OF 55 REFERENCES
    Mitigating Dictionary Attacks on Password-Protected Local Storage
    • 37
    • PDF
    GOTCHA password hackers!
    • 16
    • PDF
    Of passwords and people: measuring the effect of password-composition policies
    • 335
    • PDF
    Secure Human Identification Protocols
    • 539
    • PDF
    Authenticating Pervasive Devices with Human Protocols
    • 739
    • PDF
    Naturally Rehearsing Passwords
    • 29
    • PDF
    Stronger Password Authentication Using Browser Extensions
    • 427
    • PDF
    The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords
    • J. Bonneau
    • Computer Science
    • 2012 IEEE Symposium on Security and Privacy
    • 2012
    • 607
    • PDF
    No Plaintext Passwords
    • A. Singer
    • Computer Science, Engineering
    • login Usenix Mag.
    • 2001
    • 10
    Practical privacy: the SuLQ framework
    • 739
    • PDF