Distance-bounding Identification

被引:2
|
作者
Ahmadi, Ahmad [1 ]
Safavi-Naini, Reihaneh [1 ]
机构
[1] Univ Calgary, Dept Comp Sci, Calgary, AB, Canada
来源
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY | 2017年
关键词
Distance-bounding; Identification; Public-key; MiM;
D O I
10.5220/0006211102020212
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distance bounding (DB) protocols allow a prover to convince a verifier that they are within a distance bound. We propose a new approach to formalizing the security of DB protocols that we call distance-bounding identification (DBID), and is inspired by the security definition of cryptographic identification protocols. Our model provides a natural way of modeling the strongest man-in-the-middle attack, making security of DB protocols in line with identification protocols. We compare our model with other existing models, and give a construction that is secure in the proposed model.
引用
收藏
页码:202 / 212
页数:11
相关论文
共 50 条
  • [31] A framework for analyzing RFID distance bounding protocols
    Avoine, Gildas
    Bingol, Muhammed Ali
    Kardas, Suleyman
    Lauradoux, Cedric
    Martin, Benjamin
    JOURNAL OF COMPUTER SECURITY, 2011, 19 (02) : 289 - 317
  • [32] Post-Collusion Security and Distance Bounding
    Mauw, Sjouke
    Smith, Zach
    Toro-Pozo, Jorge
    Trujillo-Rasua, Rolando
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 941 - 958
  • [33] Unilateral Distance Bounding Protocol with Bidirectional Challenges
    Park, Myung-Ho
    Nam, Ki-Gon
    Kim, Jin Seok
    Yum, Dae Hyun
    Lee, Pil Joong
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2013, E96D (01) : 134 - 137
  • [34] Efficient Public-Key Distance Bounding Protocol
    Kilinc, Handan
    Vaudenay, Serge
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 873 - 901
  • [35] Distance Bounding Protocols on TH-UWB Radios
    Benfarah, Ahmed
    Miscopein, Benoit
    Gorce, Jean-Marie
    Lauradoux, Cedric
    Roux, Bernard
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [36] TDOA-enhanced Distance Bounding in the Presence of Noise
    Torres, Nuria Ballher
    Etzlinger, Bernhard
    Dehmollaian, Eshagh
    Springer, Andreas
    16TH IEEE INTERNATIONAL CONFERENCE ON FACTORY COMMUNICATION SYSTEMS (WFCS 2020), 2020, : 51 - 56
  • [37] Distance Bounding with IEEE 802.15.4a: Attacks and Countermeasures
    Poturalski, Marcin
    Flury, Manuel
    Papadimitratos, Panos
    Hubaux, Jean-Pierre
    Le Boudec, Jean-Yves
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (04) : 1334 - 1344
  • [38] Modeling Enlargement Attacks Against UWB Distance Bounding Protocols
    Compagno, Alberto
    Conti, Mauro
    D'Amico, Antonio Alberto
    Dini, Gianluca
    Perazzo, Pericle
    Taponecco, Lorenzo
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (07) : 1565 - 1577
  • [39] On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
    Cagalj, Mario
    Saxena, Nitesh
    Uzun, Ersin
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 443 - +
  • [40] Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the Models
    Gerault, David
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2021, PT I, 2021, 12674 : 351 - 359