Presentation 2010-09-10
A study on strengthening of the tactile information used in Undercover challenge & response authentication
Shifeng Sun, Yuki Fujii, Takahiro Sakai, Takumi Yamamoto, Masakatsu Nishigaki,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Nowadays passwords information could be stolen by shoulder-surfing attack with peeping and/or remote video camera etc. Challenge & Response authentication could be an effective measure to resist the shoulder-surfing attack. However, Challenge and Response authentication need to generate a secure response with the cryptographic functions, which is burden for users. Then Sasamoto et. al. proposed to transmit the challenge as the tactile information. Their scheme can hide the challenge to generate the response from attackers. Hence, it is expected that the security level is maintained even with a simple response generation. However, their scheme can transmit only limited information in the challenge channel. So the scheme is vulnerable against brute force attack. Jn this paper, therefore, we proposed to strengthen the tactile information to solve the problem
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Challenge & Response authentication / tactile information / hidden-challenge
Paper # ISEC2010-47
Date of Issue

Conference Information
Committee ISEC
Conference Date 2010/9/3(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A study on strengthening of the tactile information used in Undercover challenge & response authentication
Sub Title (in English)
Keyword(1) Challenge & Response authentication
Keyword(2) tactile information
Keyword(3) hidden-challenge
1st Author's Name Shifeng Sun
1st Author's Affiliation Graduate School of Informatics, Shizuoka University()
2nd Author's Name Yuki Fujii
2nd Author's Affiliation Graduate School of Informatics, Shizuoka University
3rd Author's Name Takahiro Sakai
3rd Author's Affiliation Graduate School of Informatics, Shizuoka University
4th Author's Name Takumi Yamamoto
4th Author's Affiliation Graduate School of Science and Technology Shizuoka Univ.
5th Author's Name Masakatsu Nishigaki
5th Author's Affiliation Graduate School of Science and Technology Shizuoka Univ.
Date 2010-09-10
Paper # ISEC2010-47
Volume (vol) vol.110
Number (no) 200
Page pp.pp.-
#Pages 8
Date of Issue