kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Distance-bounding, privacy-preserving attribute-based credentials
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.ORCID iD: 0000-0003-3865-212X
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.ORCID iD: 0000-0001-5742-5462
2020 (English)In: 19th International Conference on Cryptology and Network Security, CANS 2020, Springer Nature , 2020, p. 147-166Conference paper, Published paper (Refereed)
Abstract [en]

Distance-bounding anonymous credentials could be used for any location proofs that do not need to identify the prover and thus could make even notoriously invasive mechanisms such as location-based services privacy-preserving. There is, however, no secure distance-bounding protocol for general attribute-based anonymous credentials. Brands and Chaum’s (EUROCRYPT’93) protocol combining distance-bounding and Schnorr identification comes close, but does not fulfill the requirements of modern distance-bounding protocols. For that, we need a secure distance-bounding zero-knowledge proof-of-knowledge resisting mafia fraud, distance fraud, distance hijacking and terrorist fraud. Our approach is another attempt toward combining distance bounding and Schnorr to construct a distance-bounding zero-knowledge proof-of-knowledge. We construct such a protocol and prove it secure in the (extended) DFKO model for distance bounding. We also performed a symbolic verification of security properties needed for resisting these attacks, implemented in Tamarin. Encouraged by results from Singh et al. (NDSS’19), we take advantage of lessened constraints on how much can be sent in the fast phase of the distance-bounding protocol and achieve a more efficient protocol. We also provide a version that does not rely on being able to send more than one bit at a time which yields the same properties except for (full) terrorist fraud resistance.

Place, publisher, year, edition, pages
Springer Nature , 2020. p. 147-166
Keywords [en]
Cryptography, Location based services, Privacy by design, Telecommunication services, Terrorism, Anonymous credential, Distance bounding protocols, Efficient protocols, General attributes, Privacy preserving, Security properties, Symbolic verification, Zero knowledge proof, Network security
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:kth:diva-302925DOI: 10.1007/978-3-030-65411-5_8ISI: 000916416900008Scopus ID: 2-s2.0-85098261202OAI: oai:DiVA.org:kth-302925DiVA, id: diva2:1599780
Conference
14 December 2020 through 16 December 2020
Note

QC 20211001

Available from: 2021-10-01 Created: 2021-10-01 Last updated: 2024-01-10Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Bosk, DanielBuchegger, Sonja

Search in DiVA

By author/editor
Bosk, DanielBuchegger, Sonja
By organisation
Theoretical Computer Science, TCS
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 46 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf