Abstract
In this paper we describe a low-tech and user friendly solution for secure two-way communication between two parties over a network of untrusted devices. We present a solution in which displays play a central role. Our approach guarantees privacy and allows to check the authenticity of information presented on displays. Furthermore, we provide the user with a secure return channel. To this end we propose to provide every user with a small decryption display which is, for example, integrated in a credit card and requires very limited computing power. The authentication and security are based on visual cryptography which was first introduced by Naor and Shamir in 1994. We solve some practical shortcomings of traditional visual cryptography and develop protocols for two-way authentication and privacy in untrusted environments.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Benham, M.: Internet Explorer SSL Vulnerability, article on Thoughtcrime.org (August 2002), see http://www.thoughtcrime.org/ie-ssl-chain.txt
Biham, E.: Visual Cryptography with Polarisation, Security Seminar, University of Camebridge (August 1997), see http://www.cl.cam.ac.uk/Research/Security/seminars/1997/
Blundo, C., De Santis, A., Stinson, D.: On the contrast in visual cryptography schemes (1996) (manuscript), Available at ftp://theory.lcs.mit.edu/pub/tcryptol.96-13.ps
Burnside, M., Clarke, D., Gassend, B., Kotwal, T., Devadas, S., van Dijk, M., Rivest, R.: The untrusted computer problem and camera-based authentication. In: Mattern, F., Naghshineh, M. (eds.) PERVASIVE 2002. LNCS, vol. 2414, p. 114. Springer, Heidelberg (2002)
Burnside, M., Clarke, D., Mills, T., Maywah, A., Devadas, S., Rivest, R.: Proxy based security protocols in networked mobile devices. In: Proceedings SAC (2002)
Case Western Reserve University, PLC group, virtual textbook on liquid crystal displays, http://abalone.cwru.edu/tutorial/enhanced/files/textbook.htm
Claessens, J.: Analysis and design of an advanced infrastructure for secure and anonymous electronic payment system on the Internet, Ph.D. thesis, K.U. Leuven (December 2002)
Matsumoto, T.: Human identification through an insecure channel. In: Theory and Application of Cryptographic techniques, pp. 409-421 (1991)
Matsumoto, T.: Human-Computer Cryptography: An attempt. In: ACM conference on Computer and Communication security, pp. 68-75 (1966)
Menezes, A., van Oorschot, P., van Stone, S.: Handbook of Applied Cryptography. CRC Press Inc., Boca Raton (1997)
Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Naor, M., Pinkas, B.: Visual Authentication and Identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322–336. Springer, Heidelberg (1997)
Rijmen, V., Preneel, B.: Efficient colour visual encryption or ’shared colors of Benetton’. Presented at the rump session of Eurocrypt 1996 (1996), Also available at http://www.esat.kuleuven.ac.be/~rijmen/vc/
Simmons, G.: A survey of information authentication. In: Contemporary Cryptography – The science of information integrity, pp. 379–419. IEEE Computer Society Press, Los Alamitos
Stinson, D.R.: An introduction to visual cryptography. Presented at Public Key solutions (1997), Available at http://bibd.unl.edu/~stinson/VCS-PKS.ps
Tuyls, P., Hollmann, H.D.L., Lint, J.H.v., Tolhuizen, L.: Polarisation based Visual Crypto System and its Secret Sharing Schemes. Available at the IACR Cryptology ePrint Archive, http://eprint.iacr.org/2002/194/
Verheul, E., van Tilborg, H.: Constructions and properties of \(\mathcal{K}\) out of \(\mathcal{n}\) visual secret sharing schemes. Designs Codes and Cryptography 11, 179–196 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tuyls, P., Kevenaar, T., Schrijen, GJ., Staring, T., van Dijk, M. (2004). Visual Crypto Displays Enabling Secure Communications. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds) Security in Pervasive Computing. Lecture Notes in Computer Science, vol 2802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39881-3_23
Download citation
DOI: https://doi.org/10.1007/978-3-540-39881-3_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20887-7
Online ISBN: 978-3-540-39881-3
eBook Packages: Springer Book Archive