Privacy failure in the public-key distance-bounding protocols

被引:1
作者
Vaudenay, Serge [1 ]
机构
[1] Ecole Polytech Fed Lausanne, CH-1015 Lausanne, Switzerland
关键词
public key cryptography; cryptographic protocols; data protection; authorisation; privacy failure; public-key distance-bounding protocols; relay attacks; proximity access control systems; AsiaCCS; 2014; privacy protection; WISEC; 2013;
D O I
10.1049/iet-ifs.2014.0616
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public-key distance bounding protocols are well suited to defeat relay attacks in proximity access control systems when the author assume no prior shared key. At AsiaCCS 2014, Gambs, Onete, and Robert designed such a protocol with privacy protection for the prover. That is, the protocol hides the identity of the prover to active adversaries and the prover remains anonymous. In this study the author contradicts the result on this protocol by proving that an active adversary can easily identify one prover out of two possible ones. At WISEC 2013, Hermans, Peeters, and Onete proposed another protocol which is proven to protect the privacy of the prover. In this study the author complete their results and show that the protocol does not protect it in a strong sense. That is, if the adversary can corrupt the provers, then privacy is not guaranteed any more.
引用
收藏
页码:188 / 193
页数:6
相关论文
共 2 条
[1]  
JUELS A, 2006, 2006137 IACR
[2]  
Vaudenay S., 2014, 2014695 IACR