J. King, A. D. Santos, Chaoting Xuan, Scientia V. No
{"title":"KHAP:使用关键的硬AI问题来保护人机界面","authors":"J. King, A. D. Santos, Chaoting Xuan, Scientia V. No","doi":"10.5753/sbseg.2004.21241","DOIUrl":null,"url":null,"abstract":"There is often a need for users to securely interact with a remote computing system. Typical solutions assume that a local trusted computing platform is available, but this is often not the case. We introduce KHAP, a protocol for using hard artificial intelligence problems to provide message authentication checks centered around a human verifier. We also formally introduce the notion of a keyed hard AI problem, which is one that uses an authentication key to prove the source and integrity of a message. We give examples of some keyed hard AI problems, as well as examples of KHAP’s applicability to the specific problem domains of Internet voting and the use of smartcards for digital signatures.","PeriodicalId":141291,"journal":{"name":"Anais do IV Workshop em Segurança de Sistemas Computacionais (WSeg 2004)","volume":"280 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"KHAP: Using Keyed Hard AI Problems to Secure Human Interfaces\",\"authors\":\"J. King, A. D. Santos, Chaoting Xuan, Scientia V. No\",\"doi\":\"10.5753/sbseg.2004.21241\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"There is often a need for users to securely interact with a remote computing system. Typical solutions assume that a local trusted computing platform is available, but this is often not the case. We introduce KHAP, a protocol for using hard artificial intelligence problems to provide message authentication checks centered around a human verifier. We also formally introduce the notion of a keyed hard AI problem, which is one that uses an authentication key to prove the source and integrity of a message. We give examples of some keyed hard AI problems, as well as examples of KHAP’s applicability to the specific problem domains of Internet voting and the use of smartcards for digital signatures.\",\"PeriodicalId\":141291,\"journal\":{\"name\":\"Anais do IV Workshop em Segurança de Sistemas Computacionais (WSeg 2004)\",\"volume\":\"280 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-05-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Anais do IV Workshop em Segurança de Sistemas Computacionais (WSeg 2004)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5753/sbseg.2004.21241\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Anais do IV Workshop em Segurança de Sistemas Computacionais (WSeg 2004)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5753/sbseg.2004.21241","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
KHAP: Using Keyed Hard AI Problems to Secure Human Interfaces
There is often a need for users to securely interact with a remote computing system. Typical solutions assume that a local trusted computing platform is available, but this is often not the case. We introduce KHAP, a protocol for using hard artificial intelligence problems to provide message authentication checks centered around a human verifier. We also formally introduce the notion of a keyed hard AI problem, which is one that uses an authentication key to prove the source and integrity of a message. We give examples of some keyed hard AI problems, as well as examples of KHAP’s applicability to the specific problem domains of Internet voting and the use of smartcards for digital signatures.