Repository landing page

We are not able to resolve this OAI Identifier to the repository landing page. If you are the repository manager for this record, please head to the Dashboard and adjust the settings.

Towards Human Computable Passwords

Abstract

An interesting challenge for the cryptography community is to design authentication protocols that are so simple that a human can execute them without relying on a fully trusted computer. We propose several candidate authentication protocols for a setting in which the human user can only receive assistance from a semi-trusted computer - a computer that stores information and performs computations correctly but does not provide confidentiality. Our schemes use a semi-trusted computer to store and display public challenges C_iin[n]^k. The human user memorizes a random secret mapping sigma:[n]rightarrow mathbb{Z}_d and authenticates by computing responses f(sigma(C_i)) to a sequence of public challenges where f:mathbb{Z}_d^krightarrow mathbb{Z}_d is a function that is easy for the human to evaluate. We prove that any statistical adversary needs to sample m=tilde{Omega}paren{n^{s(f)}} challenge-response pairs to recover sigma, for a security parameter s(f) that depends on two key properties of f. Our lower bound generalizes recent results of Feldman et al. [Feldman\u2715] who proved analogous results for the special case d=2. To obtain our results, we apply the general hypercontractivity theorem [O\u27Donnell\u2714] to lower bound the statistical dimension of the distribution over challenge-response pairs induced by f and sigma. Our statistical dimension lower bounds apply to arbitrary functions f:mathbb{Z}_d^krightarrow mathbb{Z}_d (not just to functions that are easy for a human to evaluate). As an application, we propose a family of human computable password functions f_{k_1,k_2} in which the user needs to perform 2k_1+2k_2+1 primitive operations (e.g., adding two digits or remembering a secret value sigma(i)), and we show that s(f) = min{k_1+1, (k_2+1)/2}. For these schemes, we prove that forging passwords is equivalent to recovering the secret mapping. Thus, our human computable password schemes can maintain strong security guarantees even after an adversary has observed the user login to many different accounts

Similar works

This paper was published in Dagstuhl Research Online Publication Server.

Having an issue?

Is data on this page outdated, violates copyrights or anything else? Report the problem now and we will take corresponding actions after reviewing your request.