Results 1 - 10
of
305
Distance-Bounding Protocols (Extended Abstract)
- EUROCRYPT’93, Lecture Notes in Computer Science 765
, 1993
"... It is often the case in applications of cryptographic protocols that one party would like to determine a practical upper-bound on the physical distance to the other party. For instance, when a person conducts a cryptographic identification protocol at an entrance to a building, the access control co ..."
Abstract
-
Cited by 60 (0 self)
- Add to MetaCart
It is often the case in applications of cryptographic protocols that one party would like to determine a practical upper-bound on the physical distance to the other party. For instance, when a person conducts a cryptographic identification protocol at an entrance to a building, the access control
Challenges in Distance-Bounding
"... Abstract. Smartcard-based protocols represent an increasingly large share of the wireless authentication market, from contactless payments to remote car unlocking. Unfortunately, relay attacks pose a significant threat to these wireless solutions. However, this risk can be mitigated through the use ..."
Abstract
- Add to MetaCart
of distance-bounding protocols. In this paper, we discuss the core challenges for distance-bounding, in terms of both theoretical and practical considerations. We focus on their security, but we also explore the difficulties encountered in their design and implementation. Moreover, we present our vision
On the Need for Secure Distance-Bounding
"... Abstract. Distance-bounding is a practical solution to be used in security-sensitive contexts, mainly to prevent relay attacks. But subtle security shortcomings related to the PRF (pseudorandom function) assumption and ingenious attack techniques based on observing verifiers ’ outputs have recently ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
been put forward. In this extended abstract, we survey some of these security concerns and attempt to incorporate the lessons taught by these new developments in ideas of distance-bounding protocol design. 1
Distance-Bounding Grouping-Proof Protocols
, 2014
"... burg the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. ..."
Abstract
- Add to MetaCart
burg the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet.
Secure & Lightweight Distance-Bounding
"... Distance-bounding is a practical solution to be used in security-sensitive contexts, mainly to prevent relay attacks. The main challenge when designing such protocols is maintaining their inexpensive cryptographic nature, whilst being able to protect against as many, if not all, of the classical t ..."
Abstract
-
Cited by 9 (6 self)
- Add to MetaCart
Distance-bounding is a practical solution to be used in security-sensitive contexts, mainly to prevent relay attacks. The main challenge when designing such protocols is maintaining their inexpensive cryptographic nature, whilst being able to protect against as many, if not all, of the classical
Distance-bounding facing both mafia and
"... Abstract. Contactless technologies such as RFID, NFC, and sensor net-works are vulnerable to mafia and distance frauds. Both frauds aim at passing an authentication protocol by cheating on the actual distance be-tween the prover and the verifier. To cope these security issues, distance-bounding prot ..."
Abstract
- Add to MetaCart
Abstract. Contactless technologies such as RFID, NFC, and sensor net-works are vulnerable to mafia and distance frauds. Both frauds aim at passing an authentication protocol by cheating on the actual distance be-tween the prover and the verifier. To cope these security issues, distance-bounding
Yet Another Secure Distance-Bounding Protocol
"... Abstract. Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia fraud. Although the idea has been introduced fifteen years ago, only recently distance-bounding protocols attracted the attention of the researchers. Several new ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
Abstract. Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia fraud. Although the idea has been introduced fifteen years ago, only recently distance-bounding protocols attracted the attention of the researchers. Several
On the Pseudorandom Function Assumption in (Secure) DistanceBounding Protocols
- In International Conference on Cryptology and Information Security in Latin America Latincrypt
, 2012
"... Abstract. In this paper, we show that many formal and informal security results on distance-bounding (DB) protocols are incorrect/ incomplete. We identify that this inadequacy stems from the fact that the pseudorandom function (PRF) assumption alone, invoked in many security claims, is insufficient. ..."
Abstract
-
Cited by 12 (8 self)
- Add to MetaCart
Abstract. In this paper, we show that many formal and informal security results on distance-bounding (DB) protocols are incorrect/ incomplete. We identify that this inadequacy stems from the fact that the pseudorandom function (PRF) assumption alone, invoked in many security claims, is insufficient
Embedding distance-bounding protocols within intuitive interactions
- Security in Pervasive Computing: First International Conference, Springer-Verlag LNCS 2802, pp 143–156
, 2004
"... Abstract. Although much research was conducted on devising intuitive interaction paradigms with pervasive computing devices, it has not been realized that authentication, an important need in this context, has a strong impact on the ease of use. More specifically, distance-bounding protocols are nec ..."
Abstract
-
Cited by 12 (1 self)
- Add to MetaCart
Abstract. Although much research was conducted on devising intuitive interaction paradigms with pervasive computing devices, it has not been realized that authentication, an important need in this context, has a strong impact on the ease of use. More specifically, distance-bounding protocols
A formal approach to distance-bounding RFID protocols
- In Information Security Conference (ISC) 2011, LNCS
, 2011
"... Abstract. Distance-Bounding identification protocols aim at impeding man-in-themiddle attacks by measuring response times. There are three kinds of attacks such protocols could address: (1) Mafia attacks where the adversary relays communication between honest prover and honest verifier in different ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
Abstract. Distance-Bounding identification protocols aim at impeding man-in-themiddle attacks by measuring response times. There are three kinds of attacks such protocols could address: (1) Mafia attacks where the adversary relays communication between honest prover and honest verifier in different
Results 1 - 10
of
305