Distance-bounding Identification

被引:2
|
作者
Ahmadi, Ahmad [1 ]
Safavi-Naini, Reihaneh [1 ]
机构
[1] Univ Calgary, Dept Comp Sci, Calgary, AB, Canada
来源
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY | 2017年
关键词
Distance-bounding; Identification; Public-key; MiM;
D O I
10.5220/0006211102020212
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distance bounding (DB) protocols allow a prover to convince a verifier that they are within a distance bound. We propose a new approach to formalizing the security of DB protocols that we call distance-bounding identification (DBID), and is inspired by the security definition of cryptographic identification protocols. Our model provides a natural way of modeling the strongest man-in-the-middle attack, making security of DB protocols in line with identification protocols. We compare our model with other existing models, and give a construction that is secure in the proposed model.
引用
收藏
页码:202 / 212
页数:11
相关论文
共 50 条
  • [1] Directional Distance-Bounding Identification
    Ahmadi, Ahmad
    Safavi-Naini, Reihaneh
    INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 197 - 221
  • [2] Security of Distance-Bounding: A Survey
    Avoine, Gildas
    Bingol, Muhammed Ali
    Boureanu, Ioana
    Capkun, Srdjan
    Hancke, Gerhard
    Kardas, Suleyman
    Kim, Chong Hee
    Lauradoux, Cedric
    Martin, Benjamin
    Munilla, Jorge
    Peinado, Alberto
    Rasmussen, Kasper Bonne
    Singelee, Dave
    Tchamkerten, Aslan
    Trujillo-Rasua, Rolando
    Vaudenay, Serge
    ACM COMPUTING SURVEYS, 2019, 51 (05)
  • [3] Practical and provably secure distance-bounding
    Boureanu, Ioana
    Mitrokotsa, Aikaterini
    Vaudenay, Serge
    JOURNAL OF COMPUTER SECURITY, 2015, 23 (02) : 229 - 257
  • [4] Design of a secure distance-bounding channel for RFID
    Hancke, G. P.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (03) : 877 - 887
  • [5] Distance-Bounding Protocols: Are You Close Enough?
    Dimitrakakis, Christos
    Mitrokotsa, Aikaterini
    IEEE SECURITY & PRIVACY, 2015, 13 (04) : 47 - 51
  • [6] A Note on a Privacy-Preserving Distance-Bounding Protocol
    Aumasson, Jean-Philippe
    Mitrokotsa, Aikaterini
    Pens-Lopez, Pedro
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 78 - 92
  • [7] A Distance-Bounding Concept for Bilateral IEEE 802.15.4 Communication
    Wittwer, Joachim
    Kirsch, Fabian
    Vossiek, Martin
    IEEE INTERNATIONAL CONFERENCE ON MICROWAVES, COMMUNICATIONS, ANTENNAS AND ELECTRONICS SYSTEMS (COMCAS 2009), 2009,
  • [8] The distance-bounding protocol based on Russian cryptographic algorithmsThe distance-bounding protocol based on Russian cryptographic algorithmsV. Belsky et al.
    Vladimir Belsky
    Anastasiia Chichaeva
    Vasily Shishkin
    Kirill Tsaregorodtsev
    Journal of Computer Virology and Hacking Techniques, 2024, 20 (3) : 485 - 495
  • [9] The distance-bounding protocol based on Russian cryptographic algorithms
    Belsky, Vladimir
    Chichaeva, Anastasiia
    Shishkin, Vasily
    Tsaregorodtsev, Kirill
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (03): : 485 - 495
  • [10] Distance-Bounding Protocols: Verification without Time and Location
    Mauw, Sjouke
    Smith, Zach
    Toro-Pozo, Jorge
    Trujillo-Rasua, Rolando
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 549 - 566