Efficient Public-Key Distance Bounding Protocol

被引:4
作者
Kilinc, Handan [1 ]
Vaudenay, Serge [1 ]
机构
[1] Ecole Polytech Fed Lausanne, Lausanne, Switzerland
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II | 2016年 / 10032卷
关键词
Distance bounding; RFID; NFC; Relay attack; Key agreement; Mafia fraud; Distance fraud; Distance hijacking; SECURE; PRIVACY; PROOF;
D O I
10.1007/978-3-662-53890-6_29
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distance bounding protocols become more and more important because they are the most accurate solution to defeat relay attacks. They consist of two parties: a verifier and a prover. The prover shows that (s) he is close enough to the verifier. In some applications such as payment systems, using public-key distance bounding protocols is practical as no pre-shared secret is necessary between the payer and the payee. However, public-key cryptography requires much more computations than symmetric key cryptography. In this work, we focus on the efficiency problem in public-key distance bounding protocols and the formal security proofs of them. We construct two protocols (one without privacy, one with) which require fewer computations on the prover side compared to the existing protocols, while keeping the highest security level. Our construction is generic based on a key agreement model. It can be instantiated with only one resp. three elliptic curve computations for the prover side in the two protocols, respectively. We proved the security of our constructions formally and in detail.
引用
收藏
页码:873 / 901
页数:29
相关论文
共 37 条
[1]  
[Anonymous], 2001, IACR e-Print Arch.
[2]   A framework for analyzing RFID distance bounding protocols [J].
Avoine, Gildas ;
Bingol, Muhammed Ali ;
Kardas, Suleyman ;
Lauradoux, Cedric ;
Martin, Benjamin .
JOURNAL OF COMPUTER SECURITY, 2011, 19 (02) :289-317
[3]  
Avoine G, 2009, LECT NOTES COMPUT SC, V5735, P250, DOI 10.1007/978-3-642-04474-8_21
[4]  
Bengio S., 1991, Journal of Cryptology, V4, P175, DOI 10.1007/BF00196726
[5]  
Boureanu Ioana, 2013, Lightweight Cryptography for Security and Privacy. Second International Workshop, LightSec 2013. Revised Selected Papers: LNCS 8162, P97, DOI 10.1007/978-3-642-40392-7_8
[6]  
Boureanu I., 2015, PRACTICAL PROVABLY S
[7]   Towards Secure Distance Bounding [J].
Boureanu, Ioana ;
Mitrokotsa, Aikaterini ;
Vaudenay, Serge .
FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 :55-67
[8]   Optimal Proximity Proofs [J].
Boureanu, Ioana ;
Vaudenay, Serge .
INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 :170-190
[9]  
Brands S., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P344
[10]  
Bussard L, 2005, INT FED INFO PROC, V181, P223