Commitment-based device-pairing protocol with synchronized drawings and comparison metrics. Antikainen, M., Sethi, M., Matetic, S., & Aura, T. Pervasive and Mobile Computing, 2014.
Website abstract bibtex Abstract This article presents a new method for pairing devices securely. The commitment-based authentication uses a fuzzy secret that the devices only know approximately. Its novel feature is time-based opening of commitments in a single round. We also introduce a new source for the fuzzy secret: synchronized drawing with two fingers of the same hand on two touch screens or surfaces. The drawings are encoded as strings and compared with an edit-distance metric. A prototype implementation of this surprisingly simple and natural pairing mechanism shows that it accurately differentiates between true positives and man-in-the-middle attackers.
@article{
title = {Commitment-based device-pairing protocol with synchronized drawings and comparison metrics},
type = {article},
year = {2014},
identifiers = {[object Object]},
keywords = {commitment,device,distance,edit,pairing,protocol,reading-group,security},
websites = {http://www.sciencedirect.com/science/article/pii/S1574119214001783},
id = {bbe8278f-8deb-3de4-ae8e-746171e7aa9a},
created = {2018-07-12T21:31:45.133Z},
file_attached = {false},
profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
last_modified = {2018-07-12T21:31:45.133Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {Antikainen2014PMC},
source_type = {article},
private_publication = {false},
abstract = {Abstract This article presents a new method for pairing devices securely. The commitment-based authentication uses a fuzzy secret that the devices only know approximately. Its novel feature is time-based opening of commitments in a single round. We also introduce a new source for the fuzzy secret: synchronized drawing with two fingers of the same hand on two touch screens or surfaces. The drawings are encoded as strings and compared with an edit-distance metric. A prototype implementation of this surprisingly simple and natural pairing mechanism shows that it accurately differentiates between true positives and man-in-the-middle attackers.},
bibtype = {article},
author = {Antikainen, Markku and Sethi, Mohit and Matetic, Sinisa and Aura, Tuomas},
journal = {Pervasive and Mobile Computing},
number = {0}
}
Downloads: 0
{"_id":"6BpiEX64up6E3a75M","bibbaseid":"antikainen-sethi-matetic-aura-commitmentbaseddevicepairingprotocolwithsynchronizeddrawingsandcomparisonmetrics-2014","downloads":0,"creationDate":"2019-02-15T15:14:59.792Z","title":"Commitment-based device-pairing protocol with synchronized drawings and comparison metrics","author_short":["Antikainen, M.","Sethi, M.","Matetic, S.","Aura, T."],"year":2014,"bibtype":"article","biburl":null,"bibdata":{"title":"Commitment-based device-pairing protocol with synchronized drawings and comparison metrics","type":"article","year":"2014","identifiers":"[object Object]","keywords":"commitment,device,distance,edit,pairing,protocol,reading-group,security","websites":"http://www.sciencedirect.com/science/article/pii/S1574119214001783","id":"bbe8278f-8deb-3de4-ae8e-746171e7aa9a","created":"2018-07-12T21:31:45.133Z","file_attached":false,"profile_id":"f954d000-ce94-3da6-bd26-b983145a920f","group_id":"b0b145a3-980e-3ad7-a16f-c93918c606ed","last_modified":"2018-07-12T21:31:45.133Z","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"Antikainen2014PMC","source_type":"article","private_publication":false,"abstract":"Abstract This article presents a new method for pairing devices securely. The commitment-based authentication uses a fuzzy secret that the devices only know approximately. Its novel feature is time-based opening of commitments in a single round. We also introduce a new source for the fuzzy secret: synchronized drawing with two fingers of the same hand on two touch screens or surfaces. The drawings are encoded as strings and compared with an edit-distance metric. A prototype implementation of this surprisingly simple and natural pairing mechanism shows that it accurately differentiates between true positives and man-in-the-middle attackers.","bibtype":"article","author":"Antikainen, Markku and Sethi, Mohit and Matetic, Sinisa and Aura, Tuomas","journal":"Pervasive and Mobile Computing","number":"0","bibtex":"@article{\n title = {Commitment-based device-pairing protocol with synchronized drawings and comparison metrics},\n type = {article},\n year = {2014},\n identifiers = {[object Object]},\n keywords = {commitment,device,distance,edit,pairing,protocol,reading-group,security},\n websites = {http://www.sciencedirect.com/science/article/pii/S1574119214001783},\n id = {bbe8278f-8deb-3de4-ae8e-746171e7aa9a},\n created = {2018-07-12T21:31:45.133Z},\n file_attached = {false},\n profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},\n group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},\n last_modified = {2018-07-12T21:31:45.133Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {Antikainen2014PMC},\n source_type = {article},\n private_publication = {false},\n abstract = {Abstract This article presents a new method for pairing devices securely. The commitment-based authentication uses a fuzzy secret that the devices only know approximately. Its novel feature is time-based opening of commitments in a single round. We also introduce a new source for the fuzzy secret: synchronized drawing with two fingers of the same hand on two touch screens or surfaces. The drawings are encoded as strings and compared with an edit-distance metric. A prototype implementation of this surprisingly simple and natural pairing mechanism shows that it accurately differentiates between true positives and man-in-the-middle attackers.},\n bibtype = {article},\n author = {Antikainen, Markku and Sethi, Mohit and Matetic, Sinisa and Aura, Tuomas},\n journal = {Pervasive and Mobile Computing},\n number = {0}\n}","author_short":["Antikainen, M.","Sethi, M.","Matetic, S.","Aura, T."],"urls":{"Website":"http://www.sciencedirect.com/science/article/pii/S1574119214001783"},"bibbaseid":"antikainen-sethi-matetic-aura-commitmentbaseddevicepairingprotocolwithsynchronizeddrawingsandcomparisonmetrics-2014","role":"author","keyword":["commitment","device","distance","edit","pairing","protocol","reading-group","security"],"downloads":0},"search_terms":["commitment","based","device","pairing","protocol","synchronized","drawings","comparison","metrics","antikainen","sethi","matetic","aura"],"keywords":["commitment","device","distance","edit","pairing","protocol","reading-group","security"],"authorIDs":[]}