Distance-bounding Identification

Ahmad Ahmadi, Reihaneh Safavi-Naini

2017

Abstract

Distance bounding (DB) protocols allow a prover to convince a verifier that they are within a distance bound. We propose a new approach to formalizing the security of DB protocols that we call distance-bounding identification (DBID), and is inspired by the security definition of cryptographic identification protocols. Our model provides a natural way of modeling the strongest man-in-the-middle attack, making security of DB protocols in line with identification protocols. We compare our model with other existing models, and give a construction that is secure in the proposed model.

Download


Paper Citation


in Harvard Style

Ahmadi A. and Safavi-Naini R. (2017). Distance-bounding Identification . In Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-209-7, pages 202-212. DOI: 10.5220/0006211102020212

in Bibtex Style

@conference{icissp17,
author={Ahmad Ahmadi and Reihaneh Safavi-Naini},
title={Distance-bounding Identification},
booktitle={Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2017},
pages={202-212},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006211102020212},
isbn={978-989-758-209-7},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Distance-bounding Identification
SN - 978-989-758-209-7
AU - Ahmadi A.
AU - Safavi-Naini R.
PY - 2017
SP - 202
EP - 212
DO - 10.5220/0006211102020212