Visual authentication and identification

Moni Naor, Benny Pinkas

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

207 Scopus citations


The problems of authentication and identification have received wide interest in cryptographic research. However, there has been no satisfactory solution for the problem of authentication by a human recipient who does not use any trusted computational device, which arises for example in the context of smartcard-human interaction, in particular in the context of electronic wallets. The problem of identification is ubiquitous in communication over insecure networks. This paper introduces visual authentication and visual identification methods, which are authentication and identification methods for human users based on visual cryptography. These methods are very natural and easy to use, and can be implemented using very common "low tech" technology. The methods we suggest are efficient in the sense that a single transparency can be used for several authentications or for several identifications. The security of these methods is rigorously analyzed.

Original languageEnglish
Title of host publicationAdvances in Cryptology — CRYPTO 1997 - 17th Annual International Cryptology Conference, Proceedings
EditorsB.S. Kaliski
PublisherSpringer Verlag
Number of pages15
ISBN (Print)3540633847, 9783540633846
StatePublished - 1997
Externally publishedYes
Event17th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO 1997 - Santa Barbara, United States
Duration: 17 Aug 199721 Aug 1997

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference17th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO 1997
Country/TerritoryUnited States
CitySanta Barbara

Bibliographical note

Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 1997.


  • Authentication
  • Identification
  • Visual cryptography


Dive into the research topics of 'Visual authentication and identification'. Together they form a unique fingerprint.

Cite this