Practical and provably secure distance-bounding

Ioana Boureanu, Aikaterini Mitrokotsa, S. Vaudenay
{"title":"Practical and provably secure distance-bounding","authors":"Ioana Boureanu, Aikaterini Mitrokotsa, S. Vaudenay","doi":"10.3233/JCS-140518","DOIUrl":null,"url":null,"abstract":"From contactless payments to remote car unlocking, many applications are vulnerable to relay attacks. Distance bounding protocols are the main practical countermeasure against these attacks. At FSEi¾ź2013, we presented SKI as the first family of provably secure distance bounding protocols. At LIGHTSECi¾ź2013, we presented the best attacks against SKI. In this paper, we present the security proofs. More precisely, we explicate a general formalism for distance-bounding protocols. Then, we prove that SKI and its variants is provably secure, even under the real-life setting of noisy communications, against the main types of relay attacks: distance-fraud and generalised versions of mafia- and terrorist-fraud. For this, we reinforce the idea of using secret sharing, combined with the new notion of a leakage scheme. In view of resistance to mafia-frauds and terrorist-frauds, we present the notion of circular-keying for pseudorandom functions PRFs; this notion models the employment of a PRF, with possible linear reuse of the key. We also use PRF masking to fix common mistakes in existing security proofs/claims.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"131 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"61","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"J. Comput. Secur.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3233/JCS-140518","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 61

Abstract

From contactless payments to remote car unlocking, many applications are vulnerable to relay attacks. Distance bounding protocols are the main practical countermeasure against these attacks. At FSEi¾ź2013, we presented SKI as the first family of provably secure distance bounding protocols. At LIGHTSECi¾ź2013, we presented the best attacks against SKI. In this paper, we present the security proofs. More precisely, we explicate a general formalism for distance-bounding protocols. Then, we prove that SKI and its variants is provably secure, even under the real-life setting of noisy communications, against the main types of relay attacks: distance-fraud and generalised versions of mafia- and terrorist-fraud. For this, we reinforce the idea of using secret sharing, combined with the new notion of a leakage scheme. In view of resistance to mafia-frauds and terrorist-frauds, we present the notion of circular-keying for pseudorandom functions PRFs; this notion models the employment of a PRF, with possible linear reuse of the key. We also use PRF masking to fix common mistakes in existing security proofs/claims.
实用且可证明安全的距离边界
从非接触式支付到远程汽车解锁,许多应用程序都容易受到中继攻击。距离绑定协议是对付这些攻击的主要实用对策。在FSEi¾ź2013上,我们提出了SKI作为第一个可证明安全的距离边界协议家族。在LIGHTSECi¾ź2013上,我们展示了针对SKI的最佳攻击。在本文中,我们给出了安全性证明。更准确地说,我们解释了距离边界协议的一般形式。然后,我们证明SKI及其变体是安全的,即使在嘈杂的通信的现实环境中,也可以抵御主要类型的中继攻击:远程欺诈和黑手党和恐怖主义欺诈的一般版本。为此,我们加强了使用秘密共享的思想,并结合了泄漏方案的新概念。为了抵抗黑手党欺诈和恐怖主义欺诈,我们提出了伪随机函数PRFs的循环密钥的概念;这个概念模拟了PRF的使用,并可能对密钥进行线性重用。我们还使用PRF屏蔽来修复现有安全证明/声明中的常见错误。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信