Advertisement

Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer

  • Mike Burmester
  • Breno de Medeiros
  • Alec Yasinsac
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4631)

Abstract

We propose a new framework for authentication mechanisms that seek to interact with users in a friendlier way. Human or community-centric authentication supports vanilla access to users who fail an initial attempt to identify themselves. This limited access enables them to communicate with their peer community to achieve authentication. The actions of users with vanilla access can be rolled back in case they do not progress to full authentication status.

This mechanism is supported by a peer community trust infrastructure that exploits the effectiveness that humans have in understanding their communal roles in order to mitigate their lesser skill in remembering passwords or pins. The techniques involved essentially implement a human-centric key escrow and recovery mechanism.

Keywords

Access Control Secret Sharing Secret Sharing Scheme Authentication Mechanism Access Control System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Hopper, N., Bloom, M.: A secure human-computer authentication scheme. Technical Report CMU-CS-00-139, Carnegie Mellon University (2000)Google Scholar
  2. 2.
    Hopper, N., Bloom, M.: Secure human identification protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52–66. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Denning, D., Branstad, D.: A taxonomy of key escrow encryption. Comm. of the ACM 39, 34–40 (1996)CrossRefGoogle Scholar
  4. 4.
    Fouquè, P., Poupard, G., Stern, J.: Recovering keys in open networks. In: ITW 1999. Proc. IEEE Information Theory and Communications Workshop, IEEE Computer Society Press, Los Alamitos (1999)Google Scholar
  5. 5.
    Ellison, C., Hall, C., Milbert, R., Schneier, B.: Protecting secret keys with personal entropy. J. of Future Generation Computer Systems 16, 311–318 (2000)CrossRefGoogle Scholar
  6. 6.
    Frykholm, N., Juels, A.: Error-tolerant password recovery. In: Proc. of the 8th ACM Conference on Computer and Communications Security, pp. 1–9. ACM Press, New York (2001)CrossRefGoogle Scholar
  7. 7.
    Blakley, G.R.: Safeguarding cryptographic keys. In: Proc. of the National Computer Conference, vol. 48, pp. 242–268 (1979)Google Scholar
  8. 8.
    Shamir, A.: How to share a secret. Comm. of the ACM 22, 612–613 (1979)zbMATHCrossRefMathSciNetGoogle Scholar
  9. 9.
    Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton, USA (1997)zbMATHGoogle Scholar
  10. 10.
    Zimmermann, P.: The Official PGP Guide. MIT Press, Cambridge, MA, USA (1995)Google Scholar
  11. 11.
    Seltzer, M.I., Granger, G.R., McKusick, M.K., Smith, K.A., Soules, C.A.N., Stein, C.A.: Journaling versus soft updates: Asynchronous meta-data protection in file systems. In: Proc. of the 2000 USENIX Annual Conference, General Session, USENIX, the Advanced Computer Systems Association (2000)Google Scholar
  12. 12.
    Anderson, J.P.: Computer security technology planning study. Technical Report ESD-TR-73-51, Air Force Electronic Systems Division, Hanscom AFB, Bedford, MA (1972)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Mike Burmester
    • 1
  • Breno de Medeiros
    • 1
  • Alec Yasinsac
    • 1
  1. 1.Department of Computer Science, Florida State University, Tallahassee, FL 32306USA

Personalised recommendations