3DK-reate: Create your own 3D Key for distributed authentication in the Metaverse

被引:2
作者
De Lorenzis, Federico [1 ]
Visconti, Alessandro [1 ]
Marani, Martina [2 ]
Prifti, Erik [2 ]
Andiloro, Camilla [2 ]
Cannavo, Alberto [1 ]
Lamberti, Fabrizio [1 ]
机构
[1] Politecn Torino, DAUIN, Turin, Italy
[2] Politecn Torino, Turin, Italy
来源
2023 IEEE GAMING, ENTERTAINMENT, AND MEDIA CONFERENCE, GEM | 2023年
关键词
metaverse; 3D user interface; authentication; asymmetric cryptography;
D O I
10.1109/GEM59776.2023.10390314
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Metaverse is becoming a social and economic ecosystem in which users can meet each other, exchange personal data, and make transactions. In this respect, authentication can be easily forecasted to be one of the key aspects for the development of social, immersive Virtual Reality (VR) environments. Notwithstanding, there is still a lack of techniques that can authenticate the users while protecting their sensitive data and leveraging the intrinsic characteristics of VR experiences. In this scenario, the present paper introduces a novel authentication schema based on asymmetric cryptography. More specifically, the proposed approach supports the creation of breakout rooms in which only mutually authenticated users can access. Due to the adoption of the asymmetric cryptography schema, the users are requested to create and insert their personal and secret private keys. To this aim, the current paper proposes and investigates four different interfaces for creating and inserting the keys, leveraging the three-dimensionality of the immersive environment.
引用
收藏
页数:6
相关论文
共 22 条
[1]  
Alia M. A., 2014, P WCECS, P22
[2]   SPHinX Authentication Technique: Secure Painting autHentication in eXtended reality [J].
Bologna, Daniel ;
Micciche, Vincenzo ;
Violo, Giovanni ;
Visconti, Alessandro ;
Cannavo, Alberto ;
Lamberti, Fabrizio .
2023 IEEE CONFERENCE ON VIRTUAL REALITY AND 3D USER INTERFACES ABSTRACTS AND WORKSHOPS, VRW, 2023, :941-942
[3]   Secure Authentication with 3D Manipulation in Dynamic Layout for Virtual Reality [J].
Bu, Zongyong ;
Zheng, Haojun ;
Xin, Weiqiang ;
Zhang, Yi ;
Liu, Zitao ;
Luo, Weiqi ;
Gao, BoYu .
2023 IEEE CONFERENCE ON VIRTUAL REALITY AND 3D USER INTERFACES ABSTRACTS AND WORKSHOPS, VRW, 2023, :955-956
[4]  
Chandra S, 2014, 2014 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATION AND COMPUTATIONAL ENGINEERING (ICECCE), P83, DOI 10.1109/ICECCE.2014.7086640
[5]   Are We Ready for Metaverse? A Measurement Study of Social Virtual Reality Platforms [J].
Cheng, Ruizhi ;
Wu, Nan ;
Varvello, Matteo ;
Chen, Songqing ;
Han, Bo .
PROCEEDINGS OF THE 2022 22ND ACM INTERNET MEASUREMENT CONFERENCE, IMC 2022, 2022, :504-518
[6]   Enhancement of e-commerce security through asymmetric key algorithm [J].
Dijesh, P. ;
Babu, SuvanamSasidhar ;
Vijayalakshmi, Yellepeddi .
COMPUTER COMMUNICATIONS, 2020, 153 :125-134
[7]   VR authentication through 3D key block building [J].
Fournier, Romain ;
Freeling, Benjamin ;
Gervilla, Miguel ;
Heitz, Martin ;
Viville, Paul ;
Berenger, Kevin ;
Lecuyer, Flavien ;
Capoblanco, Antonio .
2023 IEEE CONFERENCE ON VIRTUAL REALITY AND 3D USER INTERFACES ABSTRACTS AND WORKSHOPS, VRW, 2023, :937-938
[8]   Ninja Locker: A Hand -Gesture -Enabled Knowledge-Based VR Authentication Interface [J].
Han, Isla Xi .
2023 IEEE CONFERENCE ON VIRTUAL REALITY AND 3D USER INTERFACES ABSTRACTS AND WORKSHOPS, VRW, 2023, :943-944
[9]  
HART S G, 1988, P139
[10]  
Kurtunluoglu P., 2022, arXiv