Visually Authenticated Communication
نویسندگان
چکیده
Visual document authentication is a method by which humans can check document authenticity directly, without relying on computers for cryptography. In order to be applicable, it is essential that the document is represented as an image, recognizable to humans. Representing text documents as images has a series of drawbacks, like high memory and bandwidth requirements. In this paper we present two protocols for electronic exchange of visually authenticable digital documents, one requiring high bandwidth, but easy to implement in current infrastructure, and the other with low bandwidth requirements and preservation of the original document.
منابع مشابه
CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking
Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical implementation of any other cryptographic scheme. In this paper, a three-step CPA attack against...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملAuthenticated key exchange protocol with enhanced freshness properties
In this paper, we investigate the security model for authenticated key exchange protocols. We observe that there is further room to extend the latest enhanced Canetti-Krawczyk (eCK) model. We further enhance the freshness definition for the threepass authenticated key exchange protocols such that our new definition gives the adversary more capabilities. We point out that the three-pass authenti...
متن کاملAuthentication Technologies for the Blind or Visually Impaired
Current research on “Usable Security” is still in its infancy and usable security solutions are often designed without paying attention to human disabilities. This paper aims to help fill this void in the realm of blind computer users. More specifically, we discuss research challenges we are faced with and the directions we can take towards developing authentication technologies suitable for th...
متن کاملAutenticated Encryption Schemes with Message Linkage
Authenticated encryption schemes need redundancy schemes to link up the message blocks; however, these redundancies increase communication costs. To construct links without increasing communication costs, we propose a general solution for all the authenticated encryption schemes based on the discrete logarithm problem. Because the computation cost to construct links is small, the improved schem...
متن کامل