Paper: IEEE ICCCN (2003) “Mandatory human participation: a new authentication scheme for building secure systems”

October 20th, 2003 Irfan Essa Posted in Collaborators, Computational Journalism, Dick Lipton, Jim Xu, Papers, Research No Comments »

Mandatory human participation: a new authentication scheme for building secure systems (IEEEXplore#)

Xu, J. Lipton, R. Essa, I. Sung, M. Zhu, Y.
In Proceedings. The 12th International Conference on Computer Communications and Networks, 2003. ICCCN 2003. , 20-22 Oct. 2003, pp 547 – 552, ISSN: 1095-2055, ISBN: 0-7803-7945-4, DOI: 10.1109/ICCCN.2003.1284222


Mandatory human participation (MHP) is a novel authentication scheme that asks the question “are you human?” (Instead of “who are you?”), and upon the correct answer to this question, can prove a principal to be a human being instead of a computer program. MHP helps solve old and new problems in computer security that existing security measures cannot address properly, including password (or PIN number) guessing attacks and application-level denial of service. A key component of this “are you human?” authentication process is a character morphing algorithm that transforms a character string into its graphical form in such a way that a human being won’t have any problem recognizing the original string, while a computer program (e.g., an optical character recognition program), will not be able to decipher it or make a correct guess with nonnegligible probability. The basic idea of the MHP scheme is to ask an agent to recognize the string before its login attempts or transaction requests can be honored. Here a protocol is needed to send a puzzle to an agent, check if the answer supplied by the agent is correct, and most importantly make sure that the agent cannot cheat in the process. A number of system and security issues that relate to the protocol need to be addressed for the protocol to be secure, efficient, robust, and user-friendly. The MHP scheme contributes to the foundation of the computer security by faithfully implementing novel security semantics, “human,” which existing cryptographic measures cannot express accurately. As many real-world security applications involve the interaction between a human and a computer, which naturally contains “human” as a part of its protocol semantics, we believe that the MHP scheme will find many new applications in the future.

AddThis Social Bookmark Button