Ubic: Bridging the Gap between Digital Cryptography and the Physical World

  • Mark Simkin
  • Dominique Schröder
  • Andreas Bulling
  • Mario Fritz
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8712)


Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all-digital communication, many of them have not yet made their way into the real world due to usability aspects. We aim to make another step towards a tighter integration of digital cryptography into real world interactions. We describe Ubic, a framework that allows users to bridge the gap between digital cryptography and the physical world. Ubic relies on head-mounted displays, like Google Glass, resource-friendly computer vision techniques as well as mathematically sound cryptographic primitives to provide users with better security and privacy guarantees. The framework covers key cryptographic primitives, such as secure identification, document verification using a novel secure physical document format, as well as content hiding. To make a contribution of practical value, we focused on making Ubic as simple, easily deployable, and user friendly as possible.


Usable security head-mounted displays ubiquitous cryptography authentication content verification content hiding 


  1. 1.
    News, B.: Cash machines raided with infected usb sticks (2013)Google Scholar
  2. 2.
    Bankrate: Skimming the cash out of your account (2002)Google Scholar
  3. 3.
    Times, N.Y.: Target missed signs of a data breach (2014)Google Scholar
  4. 4.
    Telegraph, T.: Mind how you move that chair - it’s hot hot-desking is a growing trend, bringing a new culture writes violet johnstone (2002)Google Scholar
  5. 5.
    House, T.W.: Bring your own device (2012)Google Scholar
  6. 6.
    for Visual Data Security, E.A.: Visual Security White Paper (2012)Google Scholar
  7. 7.
    Kumar, M., Garfinkel, T., Boneh, D., Winograd, T.: Reducing shoulder-surfing by using gaze-based password entry. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, pp. 13–19. ACM (2007)Google Scholar
  8. 8.
    International Organization for Standardization: Information technology — automatic identification and data capture techniques — qr code 2005 bar code symbology specification (2006)Google Scholar
  9. 9.
    Wicker, S.B.: Reed-Solomon Codes and Their Applications. IEEE Press, Piscataway (1994)zbMATHGoogle Scholar
  10. 10.
    Katz, J., Lindell, Y.: Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series). Chapman & Hall/CRC (2007)Google Scholar
  11. 11.
    Marforio, C., Karapanos, N., Soriente, C., Kostiainen, K., Capkun, S.: Smartphones as practical and secure location verification tokens for payments. In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2014 (2014)Google Scholar
  12. 12.
    Van Rijswijk, R.M., Van Dijk, J.: Tiqr: A novel take on two-factor authentication. In: Proceedings of the 25th International Conference on Large Installation System Administration, LISA 2011, p. 7. USENIX Association (2011)Google Scholar
  13. 13.
    Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput. 33(1), 167–226 (2004)CrossRefMathSciNetGoogle Scholar
  14. 14.
    Katz, J., Sahai, A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 146–162. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  15. 15.
    Freeman, D.M.: Converting pairing-based cryptosystems from composite-order groups to prime-order groups. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 44–61. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  16. 16.
    Harris, C., Stephens, M.: A combined corner and edge detector. In: Proceedings of the 4th Alvey Vision Conference, pp. 147–151 (1988)Google Scholar
  17. 17.
    Lindeberg, T.: Scale-Space Theory in Computer Vision. Kluwer Academic Publishers, Norwell (1994)Google Scholar
  18. 18.
    Mikolajczyk, K., Schmid, C.: A performance evaluation of local descriptors. IEEE Transactions on Pattern Analysis and Machine Intelligence 27(10), 1615–1630 (2005)CrossRefGoogle Scholar
  19. 19.
    The Legion of the Bouncy Castle: Lightweight Cryptography API (Release 1.50)Google Scholar
  20. 20.
    De Caro, A., Iovino, V.: jpbc: Java pairing based cryptography. In: Proceedings of the 16th IEEE Symposium on Computers and Communications, ISCC 2011, Kerkyra, Corfu, Greece, June 28-July 1, pp. 850–855 (2011)Google Scholar
  21. 21.
    Miyaji, A., Nakabayashi, M., Takano, S.: New explicit conditions of elliptic curve traces for fr-reduction (2001)Google Scholar
  22. 22.
    Barker, E., Barker, W., Burr, W., Polk, W., Smid, M.: Recommendation for Key Management Part 1: General (Revision 3). Technical report (July 2012)Google Scholar
  23. 23.
    Bradski, G.: Open source computer vision library (opencv) (2000)Google Scholar
  24. 24.
    ZXing: ZXing Multi-format 1D/2D barcode image processing library (2012)Google Scholar
  25. 25.
    Smith, R.: An overview of the tesseract ocr engine. In: Proceedings of the Ninth International Conference on Document Analysis and Recognition, ICDAR 2007, vol. 2, pp. 629–633. IEEE Computer Society, Washington, DC (2007)Google Scholar
  26. 26.
    D’Antoni, L., Dunn, A., Jana, S., Kohno, T., Livshits, B., Molnar, D., Moshchuk, A., Ofek, E., Roesner, F., Saponas, S., Veanes, M., Wang, H.J.: Operating system support for augmented reality applications. In: Proceedings of the 14th USENIX Conference on Hot Topics in Operating Systems, HotOS 2013, p. 21. USENIX Association, Berkeley (2013)Google Scholar
  27. 27.
    Jana, S., Narayanan, A., Shmatikov, V.: A scanner darkly: Protecting user privacy from perceptual applications. In: IEEE Symposium on Security and Privacy, pp. 349–363. IEEE Computer Society (2013)Google Scholar
  28. 28.
    Jana, S., Molnar, D., Moshchuk, A., Dunn, A., Livshits, B., Wang, H.J., Ofek, E.: Enabling Fine-Grained Permissions for Augmented Reality Applications With Recognizers. In: 22nd USENIX Security Symposium (USENIX Security 2013), Washington DC (August 2013)Google Scholar
  29. 29.
    Starnberger, G., Froihofer, L., Goeschka, K.M.: Qr-tan: Secure mobile transaction authentication. In: 2012 Seventh International Conference on Availability, Reliability and Security, pp. 578–583 (2009)Google Scholar
  30. 30.
    Saxena, N., Ekberg, J.E., Kostiainen, K., Asokan, N.: Secure device pairing based on a visual channel. In: 2006 IEEE Symposium on Security and Privacy, pp. 306–313 (2006)Google Scholar
  31. 31.
    Mccune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: Using camera phones for human-verifiable authentication. In: IEEE Symposium on Security and Privacy, pp. 110–124 (2005)Google Scholar
  32. 32.
    Liang, J., Doermann, D., Li, H.: Camera-based analysis of text and documents: a survey. International Journal on Document Analysis and Recognition 7, 84–104–104 (2005)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Mark Simkin
    • 1
  • Dominique Schröder
    • 1
  • Andreas Bulling
    • 2
  • Mario Fritz
    • 2
  1. 1.Saarland UniversitySaarbrückenGermany
  2. 2.Max Planck Institute for InformaticsSaarbrückenGermany

Personalised recommendations