A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol

  • Gildas Avoine
  • , Xavier Bultel
  • , Sébastien Gambs
  • , David Gérault
  • , Pascal Lafourcade
  • , Cristina Onete
  • , Jean Marc Robert

Résultats de recherche: Chapitre dans un livre, rapport, actes de conférenceParticipation à un ouvrage collectif lié à un colloque ou une conférenceRevue par des pairs

29 Citations (Scopus)

Résumé

Distance-bounding protocols have been introduced to thwart relay attacks against contactless authentication protocols. In this context, verifiers have to authenticate the credentials of untrusted provers. Unfortunately, these protocols are themselves subject to complex threats such as terroristfraud attacks, in which a malicious prover helps an accomplice to authenticate. Provably guaranteeing the resistance of distance-bounding protocols to these attacks is complex. The classical solutions assume that rational provers want to protect their long-term authentication credentials, even with respect to their accomplices. Thus, terrorist-fraud resistant protocols generally rely on artificial extraction mechanisms, ensuring that an accomplice can retrieve the credential of his partnering prover, if he is able to authenticate. We propose a novel approach to obtain provable terroristfraud resistant protocols that does not rely on an accomplice being able to extract any long-term key. Instead, we simply assume that he can replay the information received from the prover. Thus, rational provers should refuse to cooperate with third parties if they can impersonate them freely afterwards. We introduce a generic construction for provably secure distance-bounding protocols, and give three instances of this construction: (1) an efficient symmetric-key protocol, (2) a public-key protocol protecting the identities of provers against external eavesdroppers, and finally (3) a fully anonymous protocol protecting the identities of provers even against malicious verifiers that try to profile them.

langue originaleAnglais
titreASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security
EditeurAssociation for Computing Machinery, Inc
Pages800-814
Nombre de pages15
ISBN (Electronique)9781450349444
Les DOIs
étatPublié - 2 avr. 2017
Evénement2017 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2017 - Abu Dhabi, Emirats arabes unis
Durée: 2 avr. 20176 avr. 2017

Série de publications

NomASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security

Conférence

Conférence2017 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2017
Pays/TerritoireEmirats arabes unis
La villeAbu Dhabi
période2/04/176/04/17

Empreinte digitale

Voici les principaux termes ou expressions associés à « A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol ». Ces libellés thématiques sont générés à partir du titre et du résumé de la publication. Ensemble, ils forment une empreinte digitale unique.

Contient cette citation