of a visual channel and zero-knowledge protocols re-
sults in very efficient, reliable identification and sig-
nature systems suitable for various usage scenarios in
which a contactless interaction between the user and
the service access point is required or preferred. As a
proof-of-concept of our approach, we developed QR-
Identity, a prototypal client-server application which
allows the owner of the mobile phoneto perform iden-
tification or signature sessions w.r.t. an access control
point implemented through a webcam-equipped lap-
top. The experimental results show the good perfor-
mance of QR-Identity, and the fact that, assuming a
correct scanning positioning, it is is immune both to
false positives and false negatives in various illumina-
tion conditions.
Future work will include a comparison of QR
Codes with other 2D barcodes such as Aztec codes
and Matrix Data, through the realization a compre-
hensive test-set verifying their readability in pres-
ence of occlusions, shadows, rotations, light reflec-
tions, etc. Moreover, we are working on new zero-
knowledge protocols having specific security proper-
ties, and whose computational costs allow their uti-
lization in scenarios like those considered in this pa-
per.
REFERENCES
Balfanz, D., Smetters, D., Stewart, P., and Wong, H. C.
(2002). Talking to strangers: authentication in ad-
hoc wireless networks. In Symposium on Network and
Distributed Systems Security (NDSS). Internet Con-
sortium.
Bialoglowy, M. (2010a). Bluetooth security review, part 1.
http://www.symantec.com/connect/articles/bluetooth-
security-review-part-1.
Bialoglowy, M. (2010b). Bluetooth security review, part 2.
http://www.symantec.com/connect/articles/bluetooth-
security-review-part-2.
Bouncy-Castle (2011). Crypto apis version 1.46.
http://www.bouncycastle.org/.
Feige, U., Fiat, A., and Shamir, A. (1988). Zero-knowledge
proofs of identity. Journal of Cryptology, 1.
Fiat, A. and Shamir, A. (1987). How to prove your-
self: practical solutions of identification and signature
problems. In Advances in Cryptology - CRYPTO 86,
A.M Odlyzko (Ed.), LNCS 263. Springer.
FIPS (2001). Federal Information Processing Standards
Publication 197 - AES.
Goldwasser, S., Micali, S., and Rackoff, C. (1987). The
knowledge complexity of interactive proof systems. In
Advances in Cryptology - CRYPTO.. Springer.
Goldwasser, S., Micali, S., and Rackoff, C. (1989). The
knowledge complexity of interactive proof systems.
SIAM Journal on Computing, 18(1).
Hankerson, D., Menezes, A., and Vanstone, S. (2004).
Guide to Elliptic Curve Cryptography. Springer.
ISO/IEC (2006a). Information technology - Automatic iden-
tification and data capture techniques - Data Matrix
bar code symbology specification.
ISO/IEC (2006b). Information technology - Automatic
identification and data capture techniques - QR Code
2005 bar code symbology specification.
ISO/IEC (2008). Information technology - Automatic iden-
tification and data capture techniques – Aztec Code
bar code symbology specification.
Jakobsson, M., Sako, K., and Impagliazzo, R. (1996). Des-
ignated verifier proofs and their applications. In EU-
ROCRYPT 96, U. Maurer (Ed.), LNCS 1070. Springer.
Java-Community (2011). Java community pro-
cess: Contactless communication api.
http://www.jcp.org/en/jsr/detail?id=257.
Kieseberg, P., Leithner, M., Mulazzani, M., Munroe, L.,
Schrittwieser, S., Sinha, M., and Weippl, E. R. (2010).
Qr code security. In Fourth International Workshop
on Trustworthy Ubiquitous Computing (TwUC 2010).
ACM.
Laur, S. and Nyberg, K. (2006). Efficient mutual data
authentication using mutually authenticated strings.
In Cryptology and Network Security (CANS), LNCS
4301. Springer.
McCune, J., Perrig, A., and Reiter, M. K. (2009). Seeing-is-
believing: using camera phones for human-verifiable
authentication. Int. J. Security and Networks, 4(1-2).
Menezes, A., van Oorschot, P., and Vanstone, S. (1997).
Handbook of Applied Cryptography. CRC Press.
Schnorr, C. P. (1990). Efficient identification and signatures
for smart cards. In Advances in Cryptology - CRYPTO
89, G. Brassard (Ed.), LNCS 435. Springer.
Schnorr, C. P. (1991). Efficient signature generation by
smart cards. Journal of Cryptology, 4.
Sun-Oracle (2010). Javaplatform standard edition 6 release.
http://www.oracle.com/technetwork/java/javase/over
view/index-jsp-136246.html.
Tyley, R. (2011). Spongycastle crypto apis.
https://github.com/rtyley/spongycastle/.
ZXing-Community (2011). Zxing - open-source, multi-
format 1d/2d barcode image processing library.
http://code.google.com/p/zxing/.
PECCS 2012 - International Conference on Pervasive and Embedded Computing and Communication Systems
86