Ubic: Bridging the gap between digital cryptography and the physical world

@article{Simkin2014UbicBT,
  title={Ubic: Bridging the gap between digital cryptography and the physical world},
  author={Mark Simkin and A. Bulling and Mario Fritz and Dominique Schr{\"o}der},
  journal={ArXiv},
  year={2014},
  volume={abs/1403.1343}
}
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all-digital communication, many of them have not yet made their way into the real world due to usability aspects. We aim to make another step towards a tighter integration of digital cryptography into real world interactions. We describe Ubic, a framework… Expand
POSTER: Enhancing Security and Privacy with Google Glass
TLDR
In the hands-on demo, this work shows how Ubic allows users to read encrypted and verify digitally signed physical documents and presents an identification scheme, which is secure against real-world attacks, such as skimming and shoulder-surfing, but remains user friendly and easily deployable in current infrastructures. Expand
Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information Using Augmented Reality
TLDR
This paper proposes and analyzes two methods, visual cryptography and obfuscation for protecting the user against HUD and camera logging adversaries as well as shoulder-surfing during authentication. Expand
Security and Privacy Approaches in Mixed Reality
TLDR
The scope is extended to include work on related technologies such as augmented reality, virtual reality, and human-computer interaction as crucial components, if not the origins, of MR, as well as numerous related work from the larger area of mobile devices, wearables, and Internet ofThings. Expand
Analyzing the Use of Quick Response Codes in the Wild
TLDR
A log of all scans performed by users of a popular QR and barcode scanning app, which includes over 87 million scans performed over a 10-month period from May 2013 to March 2014, is analyzed to develop an informed understanding of the types of QR codes being created and how users interact with QR andbarcodes in the wild. Expand
SkullConduct: Biometric User Identification on Eyewear Computers Using Bone Conduction Through the Skull
TLDR
SkullConduct is presented, a biometric system that uses bone conduction of sound through the user's skull as well as a microphone readily integrated into many of these devices, such as Google Glass, thereby bringing biometric user identification to eyewear computers equipped with bone Conduction technology. Expand
Display Leakage and Transparent Wearable Displays: Investigation of Risk, Root Causes, and Defenses
TLDR
This work proposes defenses against display leakage and analyzes them in context of a range of display designs, finding multiple shipping displays suffer from display leakage. Expand
Measuring and Improving Security and Privacy on the Web: Case Studies with QR Codes, Third-Party Tracking, and Archives
Measuring and Improving Security and Privacy on the Web: Case Studies with QR Codes, Third-Party Tracking, and Archives
Eyewear computers for human-computer interaction
TLDR
In this forum, trends and new technologies with the potential to influence interaction design are scout trends and discussed with a focus on interaction technologies. Expand

References

SHOWING 1-10 OF 46 REFERENCES
Secure device pairing based on a visual channel
TLDR
This paper shows how strong mutual authentication can be achieved even with a unidirectional visual channel, without having to switch device roles, even on devices that have very limited displaying capabilities. Expand
jPBC: Java pairing based cryptography
  • A. D. Caro, V. Iovino
  • Computer Science
  • 2011 IEEE Symposium on Computers and Communications (ISCC)
  • 2011
It has been recently discovered that some cyclic groups that could be used in Cryptography admit a special bilinear pairing map that introduces extra structure to the group. Bilinear pairing mapsExpand
Smartphones as Practical and Secure Location Verification Tokens for Payments
TLDR
This work shows that practical deployment of smartphone-based second-factor authentication requires a secure enrollment phase that binds the user to his smartphone TEE and allows convenient device migration, and proposes two novel enrollment schemes that resist targeted attacks and provide easy migration. Expand
QR-TAN: Secure Mobile Transaction Authentication
TLDR
QR-TANs are a transaction authentication technique based on two-dimensional barcodes that allow the user to directly validate the content of a transaction within a trusted device and are secure even if an attacker manages to gain full control over a user’s computer. Expand
Tiqr: A Novel Take on Two-Factor Authentication
TLDR
An overview of the two-factor authentication landscape is given, a novel open standards-based authentication technology is introduced that has been developed and released in open source and the issues of closed versus open solutions are addressed. Expand
Non-malleable cryptography
TLDR
Non-malleable schemes for each of the contexts of string commitment and zero-knowledge proofs of possession of knowledge, where a user need not know anything about the number or identity of other system users are presented. Expand
Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
  • D. Freeman
  • Mathematics, Computer Science
  • EUROCRYPT
  • 2010
TLDR
An abstract framework is developed that encompasses the key properties of bilinear groups of composite order that are required to construct secure pairing-based cryptosystems, and a security theorem is given for the prime-order group instantiation of each system. Expand
Seeing-is-believing: using camera phones for human-verifiable authentication
TLDR
This work presents and analyzes seeing-is-believing, a system that utilizes 2D barcodes and camera-telephones to implement a visual channel for authentication and demonstrative identification of devices, and applies this visual channel to several problems in computer security. Expand
A Scanner Darkly: Protecting User Privacy from Perceptual Applications
TLDR
The design and implementation of DARKLY is described, a practical privacy protection system for the increasingly common scenario where an untrusted, third-party perceptual application is running on a trusted device and it is demonstrated that utility remains acceptable even with strong privacy protection. Expand
New Explicit Conditions of Elliptic Curve Traces for FR-Reduction
Elliptic curve cryptosystems([19],[25]) are based on the elliptic curve discrete logarithm problem(ECDLP). If elliptic curve cryptosystems avoid FRreduction([11],[17]) and anomalous elliptic curveExpand
...
1
2
3
4
5
...