Review of the use of human senses and capabilities in cryptography

被引:9
|
作者
Halunen, Kimmo [1 ]
Latvala, Outi-Marja [1 ]
机构
[1] VTT Tech Res Ctr Finland Ltd, Oulu, Finland
关键词
Cryptography; Human senses; Provable security; Visual cryptography; VISUAL CRYPTOGRAPHY; SECURE;
D O I
10.1016/j.cosrev.2020.100340
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptography is a key element in establishing trust and enabling services in the digital world. Currently, cryptography is realized with mathematical operations and represented in ways that are not readily accessible to human users. Thus, humans are left out of the loop when establishing trust and security in the digital world. In many areas the interaction between users and machines is being made more and more seamless and user-friendly, but cryptography has not really enjoyed such development. In this paper, we review the previous research on utilizing human senses and capabilities in cryptography. We present the most relevant existing methods and summarize the current state of the art. In addition, we propose several topics and problems that need to be solved in order to build cryptography that is more accessible to humans. These range from practical implementations of existing methods and utilizing a wider range of human senses all the way to building the theoretical foundations for this new form of cryptography. (C) 2020 The Authors. Published by Elsevier Inc.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Extended capabilities for visual cryptography
    Ateniese, G
    Blundo, C
    De Santis, A
    Stinson, DR
    THEORETICAL COMPUTER SCIENCE, 2001, 250 (1-2) : 143 - 161
  • [2] Use of Human Senses as Sensors
    Sugawara, Yoshiaki
    Sugimoto, Chie
    Minabe, Sachiko
    Iura, Yoshie
    Okazaki, Mai
    Nakagawa, Natuki
    Seto, Miwa
    Maruyama, Saki
    Hirano, Miki
    Kitayama, Ichiro
    SENSORS, 2009, 9 (05): : 3184 - 3204
  • [3] Use of Neural Networks in Cryptography: A Review
    Hadke, Pranita P.
    Kale, Swati G.
    2016 WORLD CONFERENCE ON FUTURISTIC TRENDS IN RESEARCH AND INNOVATION FOR SOCIAL WELFARE (STARTUP CONCLAVE), 2016,
  • [4] Extended Capabilities for XOR-Based Visual Cryptography
    Wu, Xiaotian
    Sun, Wei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (10) : 1592 - 1605
  • [5] Visual cryptography by use of polarization
    Yamamoto, Hirotsugu
    Imagawa, Takanori
    Suyama, Shiro
    MULTIMEDIA ON MOBILE DEVICES 2010, 2010, 7542
  • [6] Applications and Usage of Visual Cryptography: A Review
    Pandey, Anjney
    Som, Subhranil
    2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2016, : 375 - 381
  • [7] Efficient Use of Shares in Color Visual Cryptography
    Reddy, B. Dinesh
    Kumari, V. Valli
    Raju, K. V. S. V. N.
    Lakshmi, Y. Jaya
    GLOBAL TRENDS IN INFORMATION SYSTEMS AND SOFTWARE APPLICATIONS, PT 2, 2012, 270 : 311 - 319
  • [8] A Review Paper on Cryptography
    Qadir, Abdalbasit Mohammed
    Varol, Nurhayat
    2019 7TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2019,
  • [9] On the use of dynamical systems in cryptography
    Everett, Samuel
    CHAOS SOLITONS & FRACTALS, 2024, 183
  • [10] Use of cryptography in malware obfuscation
    Hassan Jameel Asghar
    Benjamin Zi Hao Zhao
    Muhammad Ikram
    Giang Nguyen
    Dali Kaafar
    Sean Lamont
    Daniel Coscia
    Journal of Computer Virology and Hacking Techniques, 2024, 20 : 135 - 152