• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 305
Next 10 →

Distance-Bounding Protocols (Extended Abstract)

by Stefan Brands, David Chaum - EUROCRYPT’93, Lecture Notes in Computer Science 765 , 1993
"... It is often the case in applications of cryptographic protocols that one party would like to determine a practical upper-bound on the physical distance to the other party. For instance, when a person conducts a cryptographic identification protocol at an entrance to a building, the access control co ..."
Abstract - Cited by 60 (0 self) - Add to MetaCart
It is often the case in applications of cryptographic protocols that one party would like to determine a practical upper-bound on the physical distance to the other party. For instance, when a person conducts a cryptographic identification protocol at an entrance to a building, the access control

Challenges in Distance-Bounding

by Ioana Boureanu, Serge Vaudenay
"... Abstract. Smartcard-based protocols represent an increasingly large share of the wireless authentication market, from contactless payments to remote car unlocking. Unfortunately, relay attacks pose a significant threat to these wireless solutions. However, this risk can be mitigated through the use ..."
Abstract - Add to MetaCart
of distance-bounding protocols. In this paper, we discuss the core challenges for distance-bounding, in terms of both theoretical and practical considerations. We focus on their security, but we also explore the difficulties encountered in their design and implementation. Moreover, we present our vision

On the Need for Secure Distance-Bounding

by Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
"... Abstract. Distance-bounding is a practical solution to be used in security-sensitive contexts, mainly to prevent relay attacks. But subtle security shortcomings related to the PRF (pseudorandom function) assumption and ingenious attack techniques based on observing verifiers ’ outputs have recently ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
been put forward. In this extended abstract, we survey some of these security concerns and attempt to incorporate the lessons taught by these new developments in ideas of distance-bounding protocol design. 1

Distance-Bounding Grouping-Proof Protocols

by Christoffer Karlsson, Christoffer S. R. Karlsson , 2014
"... burg the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. ..."
Abstract - Add to MetaCart
burg the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet.

Secure & Lightweight Distance-Bounding

by Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
"... Distance-bounding is a practical solution to be used in security-sensitive contexts, mainly to prevent relay attacks. The main challenge when designing such protocols is maintaining their inexpensive cryptographic nature, whilst being able to protect against as many, if not all, of the classical t ..."
Abstract - Cited by 9 (6 self) - Add to MetaCart
Distance-bounding is a practical solution to be used in security-sensitive contexts, mainly to prevent relay attacks. The main challenge when designing such protocols is maintaining their inexpensive cryptographic nature, whilst being able to protect against as many, if not all, of the classical

Distance-bounding facing both mafia and

by O Trujillo-rasua, Benjamin Martin, Gildas Avoine
"... Abstract. Contactless technologies such as RFID, NFC, and sensor net-works are vulnerable to mafia and distance frauds. Both frauds aim at passing an authentication protocol by cheating on the actual distance be-tween the prover and the verifier. To cope these security issues, distance-bounding prot ..."
Abstract - Add to MetaCart
Abstract. Contactless technologies such as RFID, NFC, and sensor net-works are vulnerable to mafia and distance frauds. Both frauds aim at passing an authentication protocol by cheating on the actual distance be-tween the prover and the verifier. To cope these security issues, distance-bounding

Yet Another Secure Distance-Bounding Protocol

by Ventzislav Nikov, Marc Vauclair
"... Abstract. Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia fraud. Although the idea has been introduced fifteen years ago, only recently distance-bounding protocols attracted the attention of the researchers. Several new ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
Abstract. Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia fraud. Although the idea has been introduced fifteen years ago, only recently distance-bounding protocols attracted the attention of the researchers. Several

On the Pseudorandom Function Assumption in (Secure) DistanceBounding Protocols

by Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay - In International Conference on Cryptology and Information Security in Latin America Latincrypt , 2012
"... Abstract. In this paper, we show that many formal and informal security results on distance-bounding (DB) protocols are incorrect/ incomplete. We identify that this inadequacy stems from the fact that the pseudorandom function (PRF) assumption alone, invoked in many security claims, is insufficient. ..."
Abstract - Cited by 12 (8 self) - Add to MetaCart
Abstract. In this paper, we show that many formal and informal security results on distance-bounding (DB) protocols are incorrect/ incomplete. We identify that this inadequacy stems from the fact that the pseudorandom function (PRF) assumption alone, invoked in many security claims, is insufficient

Embedding distance-bounding protocols within intuitive interactions

by Laurent Bussard, Yves Roudier - Security in Pervasive Computing: First International Conference, Springer-Verlag LNCS 2802, pp 143–156 , 2004
"... Abstract. Although much research was conducted on devising intuitive interaction paradigms with pervasive computing devices, it has not been realized that authentication, an important need in this context, has a strong impact on the ease of use. More specifically, distance-bounding protocols are nec ..."
Abstract - Cited by 12 (1 self) - Add to MetaCart
Abstract. Although much research was conducted on devising intuitive interaction paradigms with pervasive computing devices, it has not been realized that authentication, an important need in this context, has a strong impact on the ease of use. More specifically, distance-bounding protocols

A formal approach to distance-bounding RFID protocols

by Ulrich Dürholz, Marc Fischlin, Michael Kasper, Cristina Onete - In Information Security Conference (ISC) 2011, LNCS , 2011
"... Abstract. Distance-Bounding identification protocols aim at impeding man-in-themiddle attacks by measuring response times. There are three kinds of attacks such protocols could address: (1) Mafia attacks where the adversary relays communication between honest prover and honest verifier in different ..."
Abstract - Cited by 7 (0 self) - Add to MetaCart
Abstract. Distance-Bounding identification protocols aim at impeding man-in-themiddle attacks by measuring response times. There are three kinds of attacks such protocols could address: (1) Mafia attacks where the adversary relays communication between honest prover and honest verifier in different
Next 10 →
Results 1 - 10 of 305
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University