< Terug naar vorige pagina

Publicatie

Efficient, Secure, Private Distance Bounding without Key Updates

Boekbijdrage - Boekhoofdstuk Conferentiebijdrage

We propose a new distance bounding protocol, which builds upon the private RFID authentication protocol by Peeters and Hermans [25]. In contrast to most distance-bounding protocols in literature, our construction is based on public- key cryptography. Public-key cryptography (specifically Elliptic Curve Cryptography) can, contrary to popular belief, be realized on resource constrained devices such as RFID tags. Our protocol is wide-forward-insider private, achieves distance-fraud resistance and near-optimal mafia-fraud resistance. Furthermore, it provides strong impersonation security even when the number of time-critical rounds supported by the tag is very small. The computational effort for the protocol is only four scalar-EC point multiplications. Hence the required circuit area is minimal because only an ECC coprocessor is needed: no additional cryptographic primitives need to be implemented. Copyright 2013 ACM.
Boek: Proceedings of the 6th ACM conference on Wireless network security (WiSec 2013)
Pagina's: 207 - 218
ISBN:9781450319980
Jaar van publicatie:2013