Skip to main content

Visual Crypto Displays Enabling Secure Communications

  • Conference paper
Security in Pervasive Computing

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2802))

Abstract

In this paper we describe a low-tech and user friendly solution for secure two-way communication between two parties over a network of untrusted devices. We present a solution in which displays play a central role. Our approach guarantees privacy and allows to check the authenticity of information presented on displays. Furthermore, we provide the user with a secure return channel. To this end we propose to provide every user with a small decryption display which is, for example, integrated in a credit card and requires very limited computing power. The authentication and security are based on visual cryptography which was first introduced by Naor and Shamir in 1994. We solve some practical shortcomings of traditional visual cryptography and develop protocols for two-way authentication and privacy in untrusted environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Benham, M.: Internet Explorer SSL Vulnerability, article on Thoughtcrime.org (August 2002), see http://www.thoughtcrime.org/ie-ssl-chain.txt

  2. Biham, E.: Visual Cryptography with Polarisation, Security Seminar, University of Camebridge (August 1997), see http://www.cl.cam.ac.uk/Research/Security/seminars/1997/

  3. Blundo, C., De Santis, A., Stinson, D.: On the contrast in visual cryptography schemes (1996) (manuscript), Available at ftp://theory.lcs.mit.edu/pub/tcryptol.96-13.ps

  4. Burnside, M., Clarke, D., Gassend, B., Kotwal, T., Devadas, S., van Dijk, M., Rivest, R.: The untrusted computer problem and camera-based authentication. In: Mattern, F., Naghshineh, M. (eds.) PERVASIVE 2002. LNCS, vol. 2414, p. 114. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  5. Burnside, M., Clarke, D., Mills, T., Maywah, A., Devadas, S., Rivest, R.: Proxy based security protocols in networked mobile devices. In: Proceedings SAC (2002)

    Google Scholar 

  6. Case Western Reserve University, PLC group, virtual textbook on liquid crystal displays, http://abalone.cwru.edu/tutorial/enhanced/files/textbook.htm

  7. Claessens, J.: Analysis and design of an advanced infrastructure for secure and anonymous electronic payment system on the Internet, Ph.D. thesis, K.U. Leuven (December 2002)

    Google Scholar 

  8. Matsumoto, T.: Human identification through an insecure channel. In: Theory and Application of Cryptographic techniques, pp. 409-421 (1991)

    Google Scholar 

  9. Matsumoto, T.: Human-Computer Cryptography: An attempt. In: ACM conference on Computer and Communication security, pp. 68-75 (1966)

    Google Scholar 

  10. Menezes, A., van Oorschot, P., van Stone, S.: Handbook of Applied Cryptography. CRC Press Inc., Boca Raton (1997)

    MATH  Google Scholar 

  11. Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  12. Naor, M., Pinkas, B.: Visual Authentication and Identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322–336. Springer, Heidelberg (1997)

    Google Scholar 

  13. Rijmen, V., Preneel, B.: Efficient colour visual encryption or ’shared colors of Benetton’. Presented at the rump session of Eurocrypt 1996 (1996), Also available at http://www.esat.kuleuven.ac.be/~rijmen/vc/

  14. Simmons, G.: A survey of information authentication. In: Contemporary Cryptography – The science of information integrity, pp. 379–419. IEEE Computer Society Press, Los Alamitos

    Google Scholar 

  15. Stinson, D.R.: An introduction to visual cryptography. Presented at Public Key solutions (1997), Available at http://bibd.unl.edu/~stinson/VCS-PKS.ps

  16. Tuyls, P., Hollmann, H.D.L., Lint, J.H.v., Tolhuizen, L.: Polarisation based Visual Crypto System and its Secret Sharing Schemes. Available at the IACR Cryptology ePrint Archive, http://eprint.iacr.org/2002/194/

  17. Verheul, E., van Tilborg, H.: Constructions and properties of \(\mathcal{K}\) out of \(\mathcal{n}\) visual secret sharing schemes. Designs Codes and Cryptography 11, 179–196 (1997)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tuyls, P., Kevenaar, T., Schrijen, GJ., Staring, T., van Dijk, M. (2004). Visual Crypto Displays Enabling Secure Communications. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds) Security in Pervasive Computing. Lecture Notes in Computer Science, vol 2802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39881-3_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39881-3_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20887-7

  • Online ISBN: 978-3-540-39881-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics