Mobile devices are becoming ubiquitous, getting rise to a pervasive network through which people can share information and get also very complex services. A key factor for the security of both consumers and providers in this emerging business scenario is the ability for a user or a service to reliably and efficiently authenticate itself. In this paper, we consider a unidirectional visual channel of interaction between the user and the service. Identification indeed takes place by using a QR Code symbol which is displayed or scanned by the mobile device of the user in the proximity of an access point for the service. We consider protocols for strong authentication which, if correctly implemented, does not reveal any useful information both to the verifier and to any unauthorized observer (zero-knowledge protocols). Our experimental results show the feasibility of our approach for a wide range of mass-market devices and applications, including physical access to restricted or pay-per-use areas (military or parking zones, etc.), logical access to resources or services (e.g., ATMs, computer systems and Internet services), and privacy-aware voting and testing centers.

QR Code-based Identification with Mobile Devices

Giovanni Schmid;
2012

Abstract

Mobile devices are becoming ubiquitous, getting rise to a pervasive network through which people can share information and get also very complex services. A key factor for the security of both consumers and providers in this emerging business scenario is the ability for a user or a service to reliably and efficiently authenticate itself. In this paper, we consider a unidirectional visual channel of interaction between the user and the service. Identification indeed takes place by using a QR Code symbol which is displayed or scanned by the mobile device of the user in the proximity of an access point for the service. We consider protocols for strong authentication which, if correctly implemented, does not reveal any useful information both to the verifier and to any unauthorized observer (zero-knowledge protocols). Our experimental results show the feasibility of our approach for a wide range of mass-market devices and applications, including physical access to restricted or pay-per-use areas (military or parking zones, etc.), logical access to resources or services (e.g., ATMs, computer systems and Internet services), and privacy-aware voting and testing centers.
2012
Istituto di Calcolo e Reti ad Alte Prestazioni - ICAR
Inglese
César Benavente-Peces; Falah Ali; Joaquim Filipe
PECCS 2012
Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems
79
86
8
978-989-8565-00-6
SCITEPRESS - Science and Technology Publications
digital library
STATI UNITI D'AMERICA
Sì, ma tipo non specificato
24 - 26 February, 2012/PECCS
Rome
Identification (Entity authentication)
Zero knowledge protocols
QR codes
2
none
Schmid, Giovanni; Rossi, Francesco
273
info:eu-repo/semantics/conferenceObject
04 Contributo in convegno::04.01 Contributo in Atti di convegno
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/212650
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact