Secure object identification

Ammar Alkassar, Christian Stüble, Ahmad-Reza Sadeghi
2003 Proceedings of the 2003 workshop on New security paradigms - NSPW '03  
Many applications of cryptographic identification protocols are vulnerable against physical adversaries who perform real time attacks. For instance, when identifying a physical object like an automated teller machine, common identification schemes can be bypassed by faithfully relaying all messages between the communicating participants. This attack is known as mafia fraud. The Probabilistic Channel Hopping (PCH) system we introduce in this paper, solves this problem by hiding the conversation
more » ... hannel between the participants. The security of our approach is based on the assumption that an adversary cannot efficiently relay all possible communication channels of the PCH system in parallel.
doi:10.1145/986655.986668 dblp:conf/nspw/AlkassarSS03 fatcat:duecj5ogyfd2rgv47tpribili4