{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T12:40:05Z","timestamp":1750596005486,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319612720"},{"type":"electronic","value":"9783319612737"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61273-7_26","type":"book-chapter","created":{"date-parts":[[2017,7,13]],"date-time":"2017-07-13T11:22:58Z","timestamp":1499944978000},"page":"494-505","source":"Crossref","is-referenced-by-count":0,"title":["Human Public-Key Encryption"],"prefix":"10.1007","author":[{"given":"Houda","family":"Ferradi","sequence":"first","affiliation":[]},{"given":"R\u00e9mi","family":"G\u00e9raud","sequence":"additional","affiliation":[]},{"given":"David","family":"Naccache","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,14]]},"reference":[{"key":"26_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/3-540-39200-9_18","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2003","author":"L Ahn von","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: using hard AI problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 294\u2013311. Springer, Heidelberg (2003). doi: 10.1007\/3-540-39200-9_18"},{"key":"26_CR2","unstructured":"von Ahn, L., Maurer, B., McMillen, C., Abraham, D., Blum, M.: Google reCAPTCHA: https:\/\/developers.google.com\/recaptcha (2007)"},{"key":"26_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/b136509","volume-title":"Human Interactive Proofs","year":"2005","unstructured":"Baird, H.S., Lopresti, D.P. (eds.): HIP 2005. LNCS, vol. 3517. Springer, Heidelberg (2005). doi: 10.1007\/b136509"},{"key":"26_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-540-30576-7_2","volume-title":"Theory of Cryptography","author":"R Canetti","year":"2005","unstructured":"Canetti, R., Halevi, S., Steiner, M.: Hardness amplification of weakly verifiable puzzles. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 17\u201333. Springer, Heidelberg (2005). doi: 10.1007\/978-3-540-30576-7_2"},{"key":"26_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/11818175_10","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"R Canetti","year":"2006","unstructured":"Canetti, R., Halevi, S., Steiner, M.: Mitigating dictionary attacks on password-protected local storage. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 160\u2013179. Springer, Heidelberg (2006). doi: 10.1007\/11818175_10"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Chellapilla, K., Larson, K., Simard, P.Y., Czerwinski, M.: Designing human friendly human interaction proofs (HIPs). In: van der Veer, G.C., Gale, C. (eds.) Proceedings of the 2005 Conference on Human Factors in Computing Systems, CHI 2005, Portland, Oregon, USA, 2\u20137 April 2005, pp. 711\u2013720. ACM (2005)","DOI":"10.1145\/1054972.1055070"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Chew, M., Baird, H.S.: Baffletext: a human interactive proof. In: Kanungo, T., Smith, E.H.B., Hu, J., Kantor, P.B. (eds.) SPIE Proceedings, Document Recognition and Retrieval X, Proceedings, Santa Clara, California, USA, 22\u201323 January 2003, vol. 5010, pp. 305\u2013316. SPIE (2003)","DOI":"10.1117\/12.479682"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Chow, R., Golle, P., Jakobsson, M., Wang, L., Wang, X.: Making captchas clickable. In: Spasojevic, M., Corner, M.D. (eds.) Proceedings of the 9th Workshop on Mobile Computing Systems and Applications, HotMobile 2008, Napa Valley, California, USA, 25\u201326 February 2008, pp. 91\u201394. ACM (2008)","DOI":"10.1145\/1411759.1411783"},{"key":"26_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-642-15317-4_14","volume-title":"Security and Cryptography for Networks","author":"S Dziembowski","year":"2010","unstructured":"Dziembowski, S.: How to pair with a human. In: Garay, J.A., Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 200\u2013218. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-15317-4_14"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Elson, J., Douceur, J.R., Howell, J., Saul, J.: Asirra: a CAPTCHA that exploits interest-aligned manual image categorization. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, 28\u201331 October 2007, pp. 366\u2013374. ACM (2007)","DOI":"10.1145\/1315245.1315291"},{"key":"26_CR11","unstructured":"Goodfellow, I.J., Bulatov, Y., Ibarz, J., Arnoud, S., Shet, V.: Multi-digit number recognition from street view imagery using deep convolutional neural networks. CoRR abs\/1312.6082 (2013). http:\/\/arxiv.org\/abs\/1312.6082"},{"key":"26_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-642-55220-5_17","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2014","author":"A Juels","year":"2014","unstructured":"Juels, A., Ristenpart, T.: Honey encryption: security beyond the brute-force bound. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 293\u2013310. Springer, Heidelberg (2014). doi: 10.1007\/978-3-642-55220-5_17"},{"key":"26_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-642-36362-7_7","volume-title":"Public-Key Cryptography \u2013 PKC 2013","author":"A Kumarasubramanian","year":"2013","unstructured":"Kumarasubramanian, A., Ostrovsky, R., Pandey, O., Wadia, A.: Cryptography using captcha puzzles. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 89\u2013106. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-36362-7_7"},{"issue":"4","key":"26_CR14","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1145\/359460.359473","volume":"21","author":"RC Merkle","year":"1978","unstructured":"Merkle, R.C.: Secure communications over insecure channels. Commun. ACM 21(4), 294\u2013299 (1978)","journal-title":"Commun. ACM"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: Ortiz, H. (ed.) Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, Baltimore, Maryland, USA, 13\u201317 May 1990, pp. 427\u2013437. ACM (1990)","DOI":"10.1145\/100216.100273"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Nayeem, M.T., Akand, M.M.R., Sakib, N., Kabir, M.W.U.: Design of a human interaction proof (HIP) using human cognition in contextual natural conversation. In: IEEE 13th International Conference on Cognitive Informatics and Cognitive Computing, ICCI*CC 2014, London, UK, 18\u201320 August 2014, pp. 146\u2013154. IEEE (2014)","DOI":"10.1109\/ICCI-CC.2014.6921454"},{"issue":"3","key":"26_CR17","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/s10209-009-0171-2","volume":"9","author":"G Sauer","year":"2010","unstructured":"Sauer, G., Holman, J., Lazar, J., Hochheiser, H., Feng, J.: Accessible privacy and security: a universally usable human-interaction proof tool. Univ. Access Inf. Soc. 9(3), 239\u2013248 (2010)","journal-title":"Univ. Access Inf. Soc."},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Yoon, J.W., Kim, H., Jo, H., Lee, H., Lee, K.: Visual honey encryption: application to steganography. In: Alattar, A.M., Fridrich, J.J., Smith, N.M., Alfaro, P.C. (eds.) Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2015, Portland, OR, USA, 17\u201319 June 2015, pp. 65\u201374. ACM (2015)","DOI":"10.1145\/2756601.2756606"}],"container-title":["Lecture Notes in Computer Science","Paradigms in Cryptology \u2013 Mycrypt 2016. Malicious and Exploratory Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61273-7_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T11:59:10Z","timestamp":1750593550000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61273-7_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319612720","9783319612737"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61273-7_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}