2015
DOI: 10.1007/978-3-319-27659-5_18
|View full text |Cite
|
Sign up to set email alerts
|

Practical and Provably Secure Distance-Bounding

Abstract: From contactless payments to remote car unlocking, many applications are vulnerable to relay attacks. Distance bounding protocols are the main practical countermeasure against these attacks. In this paper, we present a formal analysis of SKI, which recently emerged as the first family of lightweight and provably secure distance bounding protocols. More precisely, we explicate a general formalism for distance-bounding protocols, which lead to this practical and provably secure class of protocols (and it could l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
78
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
6

Relationship

4
2

Authors

Journals

citations
Cited by 35 publications
(78 citation statements)
references
References 19 publications
0
78
0
Order By: Relevance
“…-We change the definition of soundness from [10] and [25] to make it closer to the one of interactive proofs. So, our model is pretty natural and nicely connects recent work on distance bounding (such as the BMV model [6,8,9]) and interactive proofs. -We construct ProProx, the very first sound PoPoK.…”
mentioning
confidence: 79%
See 4 more Smart Citations
“…-We change the definition of soundness from [10] and [25] to make it closer to the one of interactive proofs. So, our model is pretty natural and nicely connects recent work on distance bounding (such as the BMV model [6,8,9]) and interactive proofs. -We construct ProProx, the very first sound PoPoK.…”
mentioning
confidence: 79%
“…We refine the security definitions and other tools from the BMV model [6,8,9,25]. Constructions depend on some security parameter λ which is omitted for more readability.…”
Section: Model and Definitionsmentioning
confidence: 99%
See 3 more Smart Citations