2014
DOI: 10.1007/978-3-319-10879-7_15
|View full text |Cite
|
Sign up to set email alerts
|

EyeDecrypt — Private Interactions in Plain Sight

Abstract: We introduce EyeDecrypt, a novel technology for privacy-preserving human-computer interaction. EyeDecrypt allows only authorized users to decipher data shown on a display, such as an electronic screen or plain printed material; in the former case, the authorized user can then interact with the system (e.g., by pressing buttons on the screen), without revealing the details of the interaction to others who may be watching or to the system itself.The user views the decrypted data on a closely-held personal device… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 24 publications
0
9
0
Order By: Relevance
“…Of course, the least privilege rule is always worth implementing in the context of proper rendering. Finally, to protect display, content hiding methods (e.g., [265]) and visual cryptography (e.g., [266]) can be deployed.…”
Section: ) Attacks and Countermeasuresmentioning
confidence: 99%
“…Of course, the least privilege rule is always worth implementing in the context of proper rendering. Finally, to protect display, content hiding methods (e.g., [265]) and visual cryptography (e.g., [266]) can be deployed.…”
Section: ) Attacks and Countermeasuresmentioning
confidence: 99%
“…The second part of EEVEHAC is an end-to-end visualizably encrypted channel. For this purpose, EEVE-HAC implements EyeDecrypt (Forte et al, 2014). The original model consists of a user's personal device with the app installed, a server and an adversary.…”
Section: Visualizable Channelmentioning
confidence: 99%
“…Despite the promising developments on individual components that try to make cryptography more human friendly, there has not been a complete system that combines all the needed aspects for an encrypted communications channel. In this paper we introduce and provide a threat analysis of EEVEHAC (Endto-End Visualizable Encrypted and Human Authen-ticated Channel), a system that combines Human Authenticated Key Exchange (HAKE) (Boldyreva et al, 2017) and a visualizable encryption scheme (Forte et al, 2014). Even though these concepts have been studied in former papers, no papers discussing them as an integrated system have been published.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, the decryption process is computation-free. This feature makes VCS particularly suitable for human-computer interaction scenarios with limited computing or networks, such as ATM [6,7] and electronic voting [8].…”
Section: Introductionmentioning
confidence: 99%