Abstract
What can humans compute in their heads? We are thinking of a variety of cryptographic protocols, games like sudoku, crossword puzzles, speed chess, and so on. For example, can a person compute a function in his or her head so that an eavesdropper with a powerful computer—who sees the responses to random inputs—still cannot infer responses to new inputs? To address such questions, we propose a rigorous model of human computation and associated measures of complexity. We apply the model and measures first and foremost to the problem of 1) humanly computable password generation and then, consider related problems of 2) humanly computable “one-way functions” and 3) humanly computable “pseudorandom generators.” The theory of human computability developed here plays by different rules than standard computability; the polynomial vs. exponential time divide of modern computability theory is irrelevant to human computation. In human computability, the step counts for both humans and computers must be more concrete. As an application and running example, password generation schemas are humanly computable algorithms based on private keys. Humanly computable and/or humanly usable mean, roughly speaking, that any human needing—and capable of using—passwords can if sufficiently motivated generate and memorize a secret key in less than 1 h (including all rehearsals) and can subsequently use schema plus key to transform website names (challenges) into passwords (responses) in less than 1 min. Moreover, the schemas have precisely defined measures of security against all adversaries, human and/or machine.
Funder
National Science Foundation
Publisher
Proceedings of the National Academy of Sciences
Reference16 articles.
1. J. Blocki , “Usable human authentication: A quantitative treatment,” PhD thesis, Carnegie Mellon University, Pittsburgh, PA (2014).
2. The domino effect of password reuse;Ives;Commun. ACM,2004
3. J. Bonneau ,“The science of guessing: Analyzing an anonymized corpus of 70 million passwords” in IEEE Symposium on Security and Privacy (IEEE Computer Society, 2012), pp. 538–552.
4. Z. Li , W. He , D. Akhawe , D. Song , “The emperor’s new password manager: Security analysis of web-based password managers” in 23rd USENIX Security Symposium (USENIX Association, 2014), pp. 465–479.
5. An empirical assessment of factors impeding effective password management;Kruger;J. Inf. Priv. Secur.,2008
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献