Cryptanalysis of the Convex Hull Click Human Identification Protocol
| dc.contributor.author | Asghar, Hassan Jameel | |
| dc.contributor.author | Li, Shujun | |
| dc.contributor.author | Pieprzyk, Josef | |
| dc.contributor.author | Wang, Huaxiong | |
| dc.date.accessioned | 2020-10-13T09:24:53Z | |
| dc.date.available | 2020-10-13T09:24:53Z | |
| dc.date.issued | 2011 | eng |
| dc.description.abstract | Recently a convex hull based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. In this paper we show two efficient probabilistic attacks on this protocol which reveal the user’s secret after the observation of only a handful of authentication sessions. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values which cross the threshold of usability. | eng |
| dc.description.version | published | de |
| dc.identifier.doi | 10.1007/978-3-642-18178-8_3 | eng |
| dc.identifier.uri | https://kops.uni-konstanz.de/handle/123456789/51316 | |
| dc.language.iso | eng | eng |
| dc.subject.ddc | 004 | eng |
| dc.title | Cryptanalysis of the Convex Hull Click Human Identification Protocol | eng |
| dc.type | INPROCEEDINGS | de |
| dspace.entity.type | Publication | |
| kops.citation.bibtex | @inproceedings{Asghar2011Crypt-51316,
year={2011},
doi={10.1007/978-3-642-18178-8_3},
title={Cryptanalysis of the Convex Hull Click Human Identification Protocol},
number={6531},
isbn={978-3-642-18177-1},
issn={0302-9743},
publisher={Springer},
address={Berlin},
series={Lecture Notes in Computer Science},
booktitle={Information Security : 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
pages={24--30},
editor={Burmester, Mike},
author={Asghar, Hassan Jameel and Li, Shujun and Pieprzyk, Josef and Wang, Huaxiong}
} | |
| kops.citation.iso690 | ASGHAR, Hassan Jameel, Shujun LI, Josef PIEPRZYK, Huaxiong WANG, 2011. Cryptanalysis of the Convex Hull Click Human Identification Protocol. 13th International Conference, ISC 2010. Boca Raton, Florida, 25. Okt. 2010 - 28. Okt. 2010. In: BURMESTER, Mike, ed. and others. Information Security : 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers. Berlin: Springer, 2011, pp. 24-30. Lecture Notes in Computer Science. 6531. ISSN 0302-9743. eISSN 1611-3349. ISBN 978-3-642-18177-1. Available under: doi: 10.1007/978-3-642-18178-8_3 | deu |
| kops.citation.iso690 | ASGHAR, Hassan Jameel, Shujun LI, Josef PIEPRZYK, Huaxiong WANG, 2011. Cryptanalysis of the Convex Hull Click Human Identification Protocol. 13th International Conference, ISC 2010. Boca Raton, Florida, Oct 25, 2010 - Oct 28, 2010. In: BURMESTER, Mike, ed. and others. Information Security : 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers. Berlin: Springer, 2011, pp. 24-30. Lecture Notes in Computer Science. 6531. ISSN 0302-9743. eISSN 1611-3349. ISBN 978-3-642-18177-1. Available under: doi: 10.1007/978-3-642-18178-8_3 | eng |
| kops.citation.rdf | <rdf:RDF
xmlns:dcterms="http://purl.org/dc/terms/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
xmlns:bibo="http://purl.org/ontology/bibo/"
xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
xmlns:foaf="http://xmlns.com/foaf/0.1/"
xmlns:void="http://rdfs.org/ns/void#"
xmlns:xsd="http://www.w3.org/2001/XMLSchema#" >
<rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/51316">
<bibo:uri rdf:resource="https://kops.uni-konstanz.de/handle/123456789/51316"/>
<void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
<dc:contributor>Pieprzyk, Josef</dc:contributor>
<dc:creator>Wang, Huaxiong</dc:creator>
<dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
<dc:creator>Pieprzyk, Josef</dc:creator>
<dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
<dc:creator>Li, Shujun</dc:creator>
<dc:contributor>Wang, Huaxiong</dc:contributor>
<dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2020-10-13T09:24:53Z</dc:date>
<dcterms:title>Cryptanalysis of the Convex Hull Click Human Identification Protocol</dcterms:title>
<dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2020-10-13T09:24:53Z</dcterms:available>
<dc:contributor>Asghar, Hassan Jameel</dc:contributor>
<dc:creator>Asghar, Hassan Jameel</dc:creator>
<dcterms:abstract xml:lang="eng">Recently a convex hull based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. In this paper we show two efficient probabilistic attacks on this protocol which reveal the user’s secret after the observation of only a handful of authentication sessions. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values which cross the threshold of usability.</dcterms:abstract>
<dcterms:issued>2011</dcterms:issued>
<foaf:homepage rdf:resource="http://localhost:8080/"/>
<dc:language>eng</dc:language>
<dc:contributor>Li, Shujun</dc:contributor>
</rdf:Description>
</rdf:RDF> | |
| kops.conferencefield | 13th International Conference, ISC 2010, 25. Okt. 2010 - 28. Okt. 2010, Boca Raton, Florida | deu |
| kops.date.conferenceEnd | 2010-10-28 | eng |
| kops.date.conferenceStart | 2010-10-25 | eng |
| kops.flag.knbibliography | true | |
| kops.location.conference | Boca Raton, Florida | eng |
| kops.sourcefield | BURMESTER, Mike, ed. and others. <i>Information Security : 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers</i>. Berlin: Springer, 2011, pp. 24-30. Lecture Notes in Computer Science. 6531. ISSN 0302-9743. eISSN 1611-3349. ISBN 978-3-642-18177-1. Available under: doi: 10.1007/978-3-642-18178-8_3 | deu |
| kops.sourcefield.plain | BURMESTER, Mike, ed. and others. Information Security : 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers. Berlin: Springer, 2011, pp. 24-30. Lecture Notes in Computer Science. 6531. ISSN 0302-9743. eISSN 1611-3349. ISBN 978-3-642-18177-1. Available under: doi: 10.1007/978-3-642-18178-8_3 | deu |
| kops.sourcefield.plain | BURMESTER, Mike, ed. and others. Information Security : 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers. Berlin: Springer, 2011, pp. 24-30. Lecture Notes in Computer Science. 6531. ISSN 0302-9743. eISSN 1611-3349. ISBN 978-3-642-18177-1. Available under: doi: 10.1007/978-3-642-18178-8_3 | eng |
| kops.title.conference | 13th International Conference, ISC 2010 | eng |
| relation.isAuthorOfPublication | a28da8dd-b635-4125-ad86-10cedb27efba | |
| relation.isAuthorOfPublication.latestForDiscovery | a28da8dd-b635-4125-ad86-10cedb27efba | |
| source.bibliographicInfo.fromPage | 24 | eng |
| source.bibliographicInfo.seriesNumber | 6531 | eng |
| source.bibliographicInfo.toPage | 30 | eng |
| source.contributor.editor | Burmester, Mike | |
| source.flag.etalEditor | true | eng |
| source.identifier.eissn | 1611-3349 | eng |
| source.identifier.isbn | 978-3-642-18177-1 | eng |
| source.identifier.issn | 0302-9743 | eng |
| source.publisher | Springer | eng |
| source.publisher.location | Berlin | eng |
| source.relation.ispartofseries | Lecture Notes in Computer Science | eng |
| source.title | Information Security : 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers | eng |