Distance-bounding proof of knowledge to avoid real-time attacks

Bussard, Laurent;Bagga, Walid
IFIP SEC 2005, 20th IFIP International Information Security Conference, May 30-June 1, 2005, Chiba, Japan

Traditional authentication is based on proving the knowledge of a private key corresponding to a given public key. In some situations, especially in the context of pervasive computing, it is additionally required to verify the physical proximity of the authenticated party in order to avoid a set of real-time attacks. Brands and Chaum proposed distance-bounding protocols as a way to compute a practical upper bound on the distance between a prover and a verifier during an authentication process. Their protocol prevents frauds where an intruder sits between a legitimate prover and a verifier and succeeds to perform the distance-bounding process. However, frauds where a malicious prover and an intruder collaborate to cheat a verifier have been left as an open issue. In this paper, we provide a solution preventing both types of attacks.


Type:
Conference
City:
Chiba
Date:
2005-05-30
Department:
Digital Security
Eurecom Ref:
1607
Copyright:
© IFIP. Personal use of this material is permitted. The definitive version of this paper was published in IFIP SEC 2005, 20th IFIP International Information Security Conference, May 30-June 1, 2005, Chiba, Japan and is available at :

PERMALINK : https://www.eurecom.fr/publication/1607