Human Computable Passwords
@article{Blocki2014HumanCP, title={Human Computable Passwords}, author={J. Blocki and M. Blum and A. Datta}, journal={ArXiv}, year={2014}, volume={abs/1404.0024} }
An interesting challenge for the cryptography community is to design authentication protocols that are so simple that a human can execute them without relying on a fully trusted computer. We propose several candidate authentication protocols for a setting in which the human user can only receive assistance from a semi-trusted computer --- a computer that stores information and performs computations correctly but does not provide confidentiality. Our schemes use a semi-trusted computer to store… CONTINUE READING
Supplemental Presentations
Figures, Tables, and Topics from this paper
Paper Mentions
12 Citations
On the Economics of Offline Password Cracking
- Computer Science
- 2018 IEEE Symposium on Security and Privacy (SP)
- 2018
- 31
- PDF
When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2015
- 1
- PDF
A Neural Attack Model for Cracking Passwords in Adversarial Environments
- Computer Science
- 2019 IEEE/CIC International Conference on Communications in China (ICCC)
- 2019
- 1
On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols
- Computer Science
- CCS
- 2016
- 1
- PDF
Making Code Voting Secure Against Insider Threats Using Unconditionally Secure MIX Schemes and Human PSMT Protocols
- Computer Science
- VoteID
- 2015
- 2
- PDF
References
SHOWING 1-10 OF 55 REFERENCES
Of passwords and people: measuring the effect of password-composition policies
- Computer Science
- CHI
- 2011
- 340
- PDF
Stronger Password Authentication Using Browser Extensions
- Computer Science
- USENIX Security Symposium
- 2005
- 430
- PDF
The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords
- Computer Science
- 2012 IEEE Symposium on Security and Privacy
- 2012
- 618
- PDF