2015
DOI: 10.1007/978-3-662-47854-7_12
|View full text |Cite
|
Sign up to set email alerts
|

Private and Secure Public-Key Distance Bounding

Abstract: Abstract. Distance-Bounding is used to defeat relay attacks. For wireless payment systems, the payment terminal is not always online. So, the protocol must rely on a public key for the prover (payer). We propose a generic transformation of a (weakly secure) symmetric distance bounding protocol which has no postverification into wide-strong-private and secure public-key distance bounding.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
28
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
2

Relationship

4
3

Authors

Journals

citations
Cited by 17 publications
(28 citation statements)
references
References 16 publications
0
28
0
Order By: Relevance
“…Though they addressed the classical MF, DF and IF attacks, they did not at consider TF. Recently, Vaudenay [24] proposed a generic solution to add the privacy property to DB protocols with respect to external eavesdroppers, which relies on an authenticated keyexchange added on top of a one-time secure DB protocol. Unfortunately, it does not provide TF resistance nor anonymity against honest-but-curious or malicious verifiers.…”
Section: Protocolmentioning
confidence: 99%
“…Though they addressed the classical MF, DF and IF attacks, they did not at consider TF. Recently, Vaudenay [24] proposed a generic solution to add the privacy property to DB protocols with respect to external eavesdroppers, which relies on an authenticated keyexchange added on top of a one-time secure DB protocol. Unfortunately, it does not provide TF resistance nor anonymity against honest-but-curious or malicious verifiers.…”
Section: Protocolmentioning
confidence: 99%
“…If the distance of a prover is close enough, the verifier will be sure of the nonexistence of relay attack during the protocol execution. Apparently, it is necessary to utilize a secure distance bounding [20,26,25,27,12,6,24,9,10] in contactless payment.…”
Section: Introductionmentioning
confidence: 99%
“…The verifier only knows a public key. However, so far, only the following distance-bounding protocols are in the public key model: the Brands-Chaum protocol [11], the Bussard-Bagga protocol [12], the Hermans-Peeters-Onete (HPO) protocol [22] 1 , and PrivDB [26]. The BussardBagga protocol was broken by Bay et al [3] and none of the others protect against terrorist fraud.…”
mentioning
confidence: 99%
“…In Table 1 we update the list from [26] with all known public-key distance bounding protocols and the proven status of their security with respect to Manin-the-Middle (MiM), Distance Fraud (DF), Distance Hijacking (DH), Collusion Fraud (CF), Privacy, and Strong privacy.…”
mentioning
confidence: 99%
See 1 more Smart Citation