A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Distance-bounding Identification
2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy
Distance bounding (DB) protocols allow a prover to convince a verifier that they are within a distance bound. We propose a new approach to formalizing the security of DB protocols that we call distance-bounding identification (DBID), and is inspired by the security definition of cryptographic identification protocols. Our model provides a natural way of modeling the strongest man-in-the-middle attack, making security of DB protocols in line with identification protocols. We compare our model
doi:10.5220/0006211102020212
dblp:conf/icissp/AhmadiS17
fatcat:ue7typcy4rdpno4tnwtn5i2lba