|Budget Amount *help
¥5,600,000 (Direct Cost : ¥5,600,000)
Fiscal Year 1996 : ¥900,000 (Direct Cost : ¥900,000)
Fiscal Year 1995 : ¥4,700,000 (Direct Cost : ¥4,700,000)
1. Evaluation of challenge-response based direct human identification schemes
Compared with other direct human identification schemes, challenge response based ones have two advantages. Frist they are more robust than ones using passwords only. Second they do not require high-cost special devices such as fingerprint verifier to identify a user. However, our investigation shows that in order to make chalenge-response based schemes secure against such attacks as peeping which may be encountered in practice, the size of a set of secret data which have to be remenbered by a prover must be large, which renders these shcemes unusable in practice due to a limited memory capacity of human being.
2. Applications of visual secret sharing schemes to human identification
As a solution of the problem mentioned in 1., we proposed to apply visual secret sharing (VSS) schemes to the challenge-response based direct human identification schemes. Our proposal can make the human identification schemes extremely secure against peeping attackes, mainly due to the fact that in our proposal, challenge pattaerns cannot be seen by attackers, and bence the attackers cannot guess the prover's secret information at all. In addition, since VSS can be realized by ordinary transparencies and a simple display, low implementation cost is another outstanding advantage of out proposal.
3. Object authentication and access control
We also proposed a number of systems to achieve secure access control and object authentication by using cryptography (in particular key predistribution system or KPS). Being differenct from systems using firewalls or routers, security of our proposed systems do not rely on the underlying operating system (OS). Thus these systems are more suitable for global networks which are managed by an array of different operating systems.