Cryptanalysis of the Convex Hull Click Human Identification Protocol

dc.contributor.authorAsghar, Hassan Jameel
dc.contributor.authorLi, Shujun
dc.contributor.authorPieprzyk, Josef
dc.contributor.authorWang, Huaxiong
dc.date.accessioned2020-10-13T09:24:53Z
dc.date.available2020-10-13T09:24:53Z
dc.date.issued2011eng
dc.description.abstractRecently a convex hull based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. In this paper we show two efficient probabilistic attacks on this protocol which reveal the user’s secret after the observation of only a handful of authentication sessions. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values which cross the threshold of usability.eng
dc.description.versionpublishedde
dc.identifier.doi10.1007/978-3-642-18178-8_3eng
dc.identifier.urihttps://kops.uni-konstanz.de/handle/123456789/51316
dc.language.isoengeng
dc.subject.ddc004eng
dc.titleCryptanalysis of the Convex Hull Click Human Identification Protocoleng
dc.typeINPROCEEDINGSde
dspace.entity.typePublication
kops.citation.bibtex
@inproceedings{Asghar2011Crypt-51316,
  year={2011},
  doi={10.1007/978-3-642-18178-8_3},
  title={Cryptanalysis of the Convex Hull Click Human Identification Protocol},
  number={6531},
  isbn={978-3-642-18177-1},
  issn={0302-9743},
  publisher={Springer},
  address={Berlin},
  series={Lecture Notes in Computer Science},
  booktitle={Information Security : 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
  pages={24--30},
  editor={Burmester, Mike},
  author={Asghar, Hassan Jameel and Li, Shujun and Pieprzyk, Josef and Wang, Huaxiong}
}
kops.citation.iso690ASGHAR, Hassan Jameel, Shujun LI, Josef PIEPRZYK, Huaxiong WANG, 2011. Cryptanalysis of the Convex Hull Click Human Identification Protocol. 13th International Conference, ISC 2010. Boca Raton, Florida, 25. Okt. 2010 - 28. Okt. 2010. In: BURMESTER, Mike, ed. and others. Information Security : 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers. Berlin: Springer, 2011, pp. 24-30. Lecture Notes in Computer Science. 6531. ISSN 0302-9743. eISSN 1611-3349. ISBN 978-3-642-18177-1. Available under: doi: 10.1007/978-3-642-18178-8_3deu
kops.citation.iso690ASGHAR, Hassan Jameel, Shujun LI, Josef PIEPRZYK, Huaxiong WANG, 2011. Cryptanalysis of the Convex Hull Click Human Identification Protocol. 13th International Conference, ISC 2010. Boca Raton, Florida, Oct 25, 2010 - Oct 28, 2010. In: BURMESTER, Mike, ed. and others. Information Security : 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers. Berlin: Springer, 2011, pp. 24-30. Lecture Notes in Computer Science. 6531. ISSN 0302-9743. eISSN 1611-3349. ISBN 978-3-642-18177-1. Available under: doi: 10.1007/978-3-642-18178-8_3eng
kops.citation.rdf
<rdf:RDF
    xmlns:dcterms="http://purl.org/dc/terms/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:bibo="http://purl.org/ontology/bibo/"
    xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
    xmlns:foaf="http://xmlns.com/foaf/0.1/"
    xmlns:void="http://rdfs.org/ns/void#"
    xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > 
  <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/51316">
    <bibo:uri rdf:resource="https://kops.uni-konstanz.de/handle/123456789/51316"/>
    <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
    <dc:contributor>Pieprzyk, Josef</dc:contributor>
    <dc:creator>Wang, Huaxiong</dc:creator>
    <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dc:creator>Pieprzyk, Josef</dc:creator>
    <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dc:creator>Li, Shujun</dc:creator>
    <dc:contributor>Wang, Huaxiong</dc:contributor>
    <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2020-10-13T09:24:53Z</dc:date>
    <dcterms:title>Cryptanalysis of the Convex Hull Click Human Identification Protocol</dcterms:title>
    <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2020-10-13T09:24:53Z</dcterms:available>
    <dc:contributor>Asghar, Hassan Jameel</dc:contributor>
    <dc:creator>Asghar, Hassan Jameel</dc:creator>
    <dcterms:abstract xml:lang="eng">Recently a convex hull based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. In this paper we show two efficient probabilistic attacks on this protocol which reveal the user’s secret after the observation of only a handful of authentication sessions. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values which cross the threshold of usability.</dcterms:abstract>
    <dcterms:issued>2011</dcterms:issued>
    <foaf:homepage rdf:resource="http://localhost:8080/"/>
    <dc:language>eng</dc:language>
    <dc:contributor>Li, Shujun</dc:contributor>
  </rdf:Description>
</rdf:RDF>
kops.conferencefield13th International Conference, ISC 2010, 25. Okt. 2010 - 28. Okt. 2010, Boca Raton, Floridadeu
kops.date.conferenceEnd2010-10-28eng
kops.date.conferenceStart2010-10-25eng
kops.flag.knbibliographytrue
kops.location.conferenceBoca Raton, Floridaeng
kops.sourcefieldBURMESTER, Mike, ed. and others. <i>Information Security : 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers</i>. Berlin: Springer, 2011, pp. 24-30. Lecture Notes in Computer Science. 6531. ISSN 0302-9743. eISSN 1611-3349. ISBN 978-3-642-18177-1. Available under: doi: 10.1007/978-3-642-18178-8_3deu
kops.sourcefield.plainBURMESTER, Mike, ed. and others. Information Security : 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers. Berlin: Springer, 2011, pp. 24-30. Lecture Notes in Computer Science. 6531. ISSN 0302-9743. eISSN 1611-3349. ISBN 978-3-642-18177-1. Available under: doi: 10.1007/978-3-642-18178-8_3deu
kops.sourcefield.plainBURMESTER, Mike, ed. and others. Information Security : 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers. Berlin: Springer, 2011, pp. 24-30. Lecture Notes in Computer Science. 6531. ISSN 0302-9743. eISSN 1611-3349. ISBN 978-3-642-18177-1. Available under: doi: 10.1007/978-3-642-18178-8_3eng
kops.title.conference13th International Conference, ISC 2010eng
relation.isAuthorOfPublicationa28da8dd-b635-4125-ad86-10cedb27efba
relation.isAuthorOfPublication.latestForDiscoverya28da8dd-b635-4125-ad86-10cedb27efba
source.bibliographicInfo.fromPage24eng
source.bibliographicInfo.seriesNumber6531eng
source.bibliographicInfo.toPage30eng
source.contributor.editorBurmester, Mike
source.flag.etalEditortrueeng
source.identifier.eissn1611-3349eng
source.identifier.isbn978-3-642-18177-1eng
source.identifier.issn0302-9743eng
source.publisherSpringereng
source.publisher.locationBerlineng
source.relation.ispartofseriesLecture Notes in Computer Scienceeng
source.titleInformation Security : 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Paperseng

Dateien