2015
DOI: 10.1007/978-3-319-26059-4_6
|View full text |Cite
|
Sign up to set email alerts
|

Sound Proof of Proximity of Knowledge

Abstract: Abstract. Public-key distance bounding schemes are needed to defeat relay attacks in payment systems. So far, only five such schemes exist, but fail to fully protect against malicious provers. In this paper, we solve this problem. We provide a full formalism to define the proof of proximity of knowledge (PoPoK). Protocols should succeed if and only if a prover holding a secret is within the proximity of the verifier. Like proofs of knowledge, these protocols must satisfy completeness, soundness (protection for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
6

Relationship

3
3

Authors

Journals

citations
Cited by 16 publications
(24 citation statements)
references
References 25 publications
0
24
0
Order By: Relevance
“…They are in bold in Tables 1 and 2, and are the following: KZP (2008) [33], Hitomi (2010) [45], NUS (2011) [28], SKI pro (2013) [9], FO (2013) [25], DB1 (2014) [12], DB2 (2014) [12], ProProx (2014) [53] and VSSDB (2014) [26]. The security level for impersonation fraud are the same for all these protocols and it is the best security level, i.e., it is equivalent at the security against brute force.…”
Section: Comparison Of Db Protocolsmentioning
confidence: 99%
“…They are in bold in Tables 1 and 2, and are the following: KZP (2008) [33], Hitomi (2010) [45], NUS (2011) [28], SKI pro (2013) [9], FO (2013) [25], DB1 (2014) [12], DB2 (2014) [12], ProProx (2014) [53] and VSSDB (2014) [26]. The security level for impersonation fraud are the same for all these protocols and it is the best security level, i.e., it is equivalent at the security against brute force.…”
Section: Comparison Of Db Protocolsmentioning
confidence: 99%
“…We recall and adapt the framework of [4,18]. We assume a multiparty setting in which participants have a location and information travels at the speed of light.…”
Section: Definitionsmentioning
confidence: 99%
“…Malicious participants may run an arbitrary probabilistic polynomial-time (PPT) algorithm. The definition below is adapted from [4,18] to accommodate identification protocols and also to bridge public-key and symmetric distance bounding. …”
Section: Definitionsmentioning
confidence: 99%
See 2 more Smart Citations