Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3052973.3053000acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol

Published: 02 April 2017 Publication History

Abstract

Distance-bounding protocols have been introduced to thwart relay attacks against contactless authentication protocols. In this context, verifiers have to authenticate the credentials of untrusted provers. Unfortunately, these protocols are themselves subject to complex threats such as terrorist-fraud attacks, in which a malicious prover helps an accomplice to authenticate. Provably guaranteeing the resistance of distance-bounding protocols to these attacks is complex. The classical solutions assume that rational provers want to protect their long-term authentication credentials, even with respect to their accomplices. Thus, terrorist-fraud resistant protocols generally rely on artificial extraction mechanisms, ensuring that an accomplice can retrieve the credential of his partnering prover, if he is able to authenticate. We propose a novel approach to obtain provable terrorist-fraud resistant protocols that does not rely on an accomplice being able to extract any long-term key. Instead, we simply assume that he can replay the information received from the prover. Thus, rational provers should refuse to cooperate with third parties if they can impersonate them freely afterwards. We introduce a generic construction for provably secure distance-bounding protocols, and give three instances of this construction: (1) an efficient symmetric-key protocol, (2) a public-key protocol protecting the identities of provers against external eavesdroppers, and finally (3) a fully anonymous protocol protecting the identities of provers even against malicious verifiers that try to profile them.

References

[1]
Ahmadi, A., and Safavi-Naini, R. Privacy-preserving distance-bounding proof-of-knowledge. In Proc. of the 16th Int. Conf. on Information and Communications Security - Revised Selected Papers, LNCS. Springer, 2014, pp. 74--88.
[2]
Avoine, G., Bingöl, M. A., Kardaş, S., Lauradoux, C., and Martin, B. A formal framework for analyzing RFID distance bounding protocols. Journal of Computer Security - Special Issue on RFID System Security 19, 2 (2010), 289--317.
[3]
Avoine, G., Lauradoux, C., and Martin, B. How secret-sharing can defeat terrorist fraud. In Proc. of WiSec (2011), ACM, pp. 145--156.
[4]
Bengio, S., Brassard, G., Desmedt, Y. G., Goutier, C., and Quisquater, J.-J. Secure implementation of identification systems. Journal of Cryptology 4, 3 (1991), 175--183.
[5]
Boureanu, I., Mitrokotsa, A., and S.Vaudenay. Secure and lightweight distance-bounding. In Proc. of LightSec (2013), LNCS, Springer, pp. 97--113.
[6]
Boureanu, I., Mitrokotsa, A., and Vaudenay, S. On the pseudorandom function assumption in (secure) distance-bounding protocols: PRF-ness alone does not stop the frauds! In Proc. of the 2nd Int. Conf. on Cryptology and Information Security in Latin America (2012), LNCS, Springer, pp. 100--120.
[7]
Boureanu, I., Mitrokotsa, A., and Vaudenay, S. Practical & provably secure distance-bounding. Cryptology ePrint Archive, Report 2013/465, 2013.
[8]
Boureanu, I., Mitrokotsa, A., and Vaudenay, S. Towards secure distance bounding. In Proc. of Fast Software Encryption, LNCS. Springer, 2014, pp. 55--67.
[9]
Boureanu, I., and Vaudenay, S. Optimal proximity proofs. In Proc. 10th Int. Conf. Inscrypt 2014 (2014), LNCS, Springer, pp. 170--190.
[10]
Brands, S., and Chaum, D. Distance-bounding protocols. In Proc. of Advances in Cryptology -- EUROCRYPT (1993), LNCS, Springer, pp. 344--359.
[11]
Brelurut, A., Gérault, D., and Lafourcade, P. Survey of distance bounding protocols and threats. In Proc. of 8th Int. Symp. on Foundations and Practice of Security (2015), LNCS, Springer, pp. 29--49.
[12]
Bultel, X., Gambs, S., Gérault, D., Lafourcade, P., Onete, C., and Robert, J.-M. A prover-anonymous and terrorist-fraud resistant distance-bounding protocol. In Proc. of WiSec (2016), ACM.
[13]
Bussard, L., and Bagga, W. Distance-bounding proof of knowledge to avoid real-time attacks. In Proc. of Security and Privacy in the Age of Ubiquitous Computing (2005), IFIP International Federation for Information Processing, Springer, pp. 222--238.
[14]
Cremers, C., Rasmussen, K. B., Schmidt, B., and Capkun, S. Distance hijacking attacks on distance bounding protocols. In Proc. of IEEE Symp. on Security and Privacy (2012), IEEE, pp. 113--127.
[15]
Dürholz, U., Fischlin, M., Kasper, M., and Onete, C. A formal approach to distance bounding RFID protocols. In Proc. of ISC (2011), vol. 7001 of LNCS, Springer, pp. 47--62.
[16]
Dürholz, U., Fischlin, M., Kasper, M., and Onete, C. A formal approach to distance-bounding RFID protocols. In Proc. of Int. Conf. on Information Security, LNCS. Springer, 2011, pp. 47--62.
[17]
Fischlin, M., and Onete, C. Terrorism in distance bounding: Modeling terrorist fraud resistance. In Proc. of ACNS (2013), LNCS, Springer, pp. 414--431.
[18]
Gambs, S., Killijian, M., and del Prado Cortez, M. N. Show me how you move and I will tell you who you are. Trans. Data Privacy 4, 2 (2011), 103--126.
[19]
Gambs, S., Onete, C., and Robert, J.-M. Prover anonymous and deniable distance-bounding authentication. In Proc. of AsiaCCS (2014), ACM, pp. 501--506.
[20]
Hermans, J., Peeters, R., and Onete, C. Efficient, secure, private distance bounding without key updates. In Proc. of WiSec (2013), ACM, pp. 207--218.
[21]
Kim, C. H., Avoine, G., Koeune, F., Standaert, F., and Pereira, O. The Swiss-Knife RFID distance bounding protocol. In Proc. of Information Security and Cryptology (2008), LNCS, Springer, pp. 98--115.
[22]
Nakanishi, T., Fujii, H., Hira, Y., and Funabiki, N. Revocable group signature schemes with constant costs for signing and verifying. In Proc. of Public Key Cryptography, LNCS. Springer, 2009, pp. 463--480.
[23]
Shoup, V. Sequences of games: a tool for taming complexity in security proofs, 2004. URL: http://eprint.iacr.org/2004/332.
[24]
Vaudenay, S. On privacy models for RFID. In Proc. of Advances in Cryptology -- Asiacrypt (2007), LNCS, Springer, pp. 68--87.
[25]
Vaudenay, S. Private and secure public-key distance bounding: Application to NFC payment. In Proc. of Financial Cryptography (2015), LNCS, Springer, pp. 207--216.
[26]
Vaudenay, S. Sound proof of proximity of knowledge. In Proc. of 9th Int. Conf. ProvSec (2015), LNCS, Springer, pp. 105--126.

Cited By

View all
  • (2024)Privacy-preserving location authentication for low-altitude UAVs: A blockchain-based approachSecurity and Safety10.1051/sands/20240043(2024004)Online publication date: 16-Apr-2024
  • (2024)Distance‐Bounding ProtocolsCooperative Intelligent Transport Systems10.1002/9781394325849.ch11(273-293)Online publication date: 11-Oct-2024
  • (2023)Privacy-Preserving Proof-of-Location With Security Against Geo-TamperingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.312807320:1(131-146)Online publication date: 1-Jan-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security
April 2017
952 pages
ISBN:9781450349444
DOI:10.1145/3052973
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 April 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anonymous protocol
  2. distance bounding
  3. efficient protocol
  4. proven secure protocol

Qualifiers

  • Research-article

Funding Sources

Conference

ASIA CCS '17
Sponsor:

Acceptance Rates

ASIA CCS '17 Paper Acceptance Rate 67 of 359 submissions, 19%;
Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)11
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Privacy-preserving location authentication for low-altitude UAVs: A blockchain-based approachSecurity and Safety10.1051/sands/20240043(2024004)Online publication date: 16-Apr-2024
  • (2024)Distance‐Bounding ProtocolsCooperative Intelligent Transport Systems10.1002/9781394325849.ch11(273-293)Online publication date: 11-Oct-2024
  • (2023)Privacy-Preserving Proof-of-Location With Security Against Geo-TamperingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.312807320:1(131-146)Online publication date: 1-Jan-2023
  • (2023)Composable Anonymous Proof-of-Location With User-Controlled Offline AccessIEEE Access10.1109/ACCESS.2023.327939511(50884-50898)Online publication date: 2023
  • (2022)So Near and Yet So Far – Symbolic Verification of Distance-Bounding ProtocolsACM Transactions on Privacy and Security10.1145/350140225:2(1-39)Online publication date: 1-Jul-2022
  • (2021)Mechanised Models and Proofs for Distance-Bounding2021 IEEE 34th Computer Security Foundations Symposium (CSF)10.1109/CSF51468.2021.00049(1-16)Online publication date: Jun-2021
  • (2021)Personalized Privacy Protection SolutionsPersonalized Privacy Protection in Big Data10.1007/978-981-16-3750-6_4(23-130)Online publication date: 24-Jul-2021
  • (2021)Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the ModelsFinancial Cryptography and Data Security10.1007/978-3-662-64322-8_17(351-359)Online publication date: 23-Oct-2021
  • (2021)From Relay Attacks to Distance-Bounding ProtocolsSecurity of Ubiquitous Computing Systems10.1007/978-3-030-10591-4_7(113-130)Online publication date: 15-Jan-2021
  • (2020)Dynamic Membership Management in Anonymous and Deniable Distance BoundingSustainability10.3390/su12241033012:24(10330)Online publication date: 10-Dec-2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media