J. King, A. D. Santos, Chaoting Xuan, Scientia V. No
{"title":"KHAP: Using Keyed Hard AI Problems to Secure Human Interfaces","authors":"J. King, A. D. Santos, Chaoting Xuan, Scientia V. No","doi":"10.5753/sbseg.2004.21241","DOIUrl":null,"url":null,"abstract":"There is often a need for users to securely interact with a remote computing system. Typical solutions assume that a local trusted computing platform is available, but this is often not the case. We introduce KHAP, a protocol for using hard artificial intelligence problems to provide message authentication checks centered around a human verifier. We also formally introduce the notion of a keyed hard AI problem, which is one that uses an authentication key to prove the source and integrity of a message. We give examples of some keyed hard AI problems, as well as examples of KHAP’s applicability to the specific problem domains of Internet voting and the use of smartcards for digital signatures.","PeriodicalId":141291,"journal":{"name":"Anais do IV Workshop em Segurança de Sistemas Computacionais (WSeg 2004)","volume":"280 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Anais do IV Workshop em Segurança de Sistemas Computacionais (WSeg 2004)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5753/sbseg.2004.21241","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
There is often a need for users to securely interact with a remote computing system. Typical solutions assume that a local trusted computing platform is available, but this is often not the case. We introduce KHAP, a protocol for using hard artificial intelligence problems to provide message authentication checks centered around a human verifier. We also formally introduce the notion of a keyed hard AI problem, which is one that uses an authentication key to prove the source and integrity of a message. We give examples of some keyed hard AI problems, as well as examples of KHAP’s applicability to the specific problem domains of Internet voting and the use of smartcards for digital signatures.