In this paper, a new secure distance-bounding protocol is presented. It is self-contained and composable with other protocols for example for authentication or key-negotiation. It allows periodically execution and achieves better use of the communication channels by exchanging authenticated nonces. The proposed protocol becomes suitable for wider class of devices, since the resource requirements to the prover are relaxed.
Category / Keywords: cryptographic protocols / Distance-Bounding protocols, Relay Attacks, Mafia-Fraud Publication Info: This is the full version of the paper with the same title in SECRYPT 2008. Date: received 23 Jul 2008 Contact author: venci nikov at gmail com Available format(s): PDF | BibTeX Citation Version: 20080802:134103 (All versions of this report) Short URL: ia.cr/2008/319 Discussion forum: Show discussion | Start new discussion