Human-Centered A.I. and Security Primitives
نویسندگان
چکیده
منابع مشابه
Towards New Security Primitives Based on Hard AI Problems
Many security primitives are based on hard mathematical problems. Using hard AI problems for security has emerged as an exciting new paradigm (with Captcha being the most successful example). However, this paradigm has achieved just a limited success, and has been under-explored. In this paper, we motivate and sketch a new security primitive based on hard AI problems.
متن کاملCognitive Orthoses: Toward Human-Centered AI
WINTER 2015 5 As George Bernard Shaw once observed, being slandered is better than being ignored. So maybe AI researchers should be happy about what’s been happening lately. After decades of pundits and philosophers arguing that AI is provably impossible, suddenly that argument has been replaced with the assertion that not only is it possible, but superhuman AI is so inevitable that it is the g...
متن کاملSecurity Amplification for InteractiveCryptographic Primitives
Security amplification is an important problem in Cryptography: starting with a “weakly secure” variant of some cryptographic primitive, the goal is to build a “strongly secure” variant of the same primitive. This question has been successfully studied for a variety of important cryptographic primitives, such as one-way functions, collision-resistant hash functions, encryption schemes and weakl...
متن کاملQuantum Security of Cryptographic Primitives
We call quantum security the area of IT security dealing with scenarios where one or more parties have access to quantum hardware. This encompasses both the fields of post-quantum cryptography (that is, traditional cryptography engineered to be resistant against quantum adversaries), and quantum cryptography (that is, security protocols designed to be natively run on a quantum infrastructure, s...
متن کاملUser-Centered Security Engineering
Current approaches to security engineering mainly focus on attacker models, secure mechanisms, and code testing to ensure a high level security standard. However, these approaches do not sufficiently emphasize the usability of the system and the risk arises that the implemented mechanisms create overheads for users or require unworkable user behaviour. In addition, end users will not use securi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer Science Research
سال: 2020
ISSN: 2630-5151
DOI: 10.30564/jcsr.v2i4.2534