Cryptology ePrint Archive: Report 2018/366

Directional Distance-Bounding Identification Protocols

Ahmad Ahmadi and Reihaneh Safavi-Naini

Abstract: Distance bounding (DB) protocols allow a prover to convince a verifier that they are within a distance bound. A public key distance bounding relies on the public key of the users to prove their identity and proximity claim. There has been a number of approaches in the literature to formalize security of public key distance bounding protocols. In this paper we extend an earlier work that formalizes security of public key DB protocols using an approach that is inspired by the security definition of identification protocols, and is referred to it as distance-bounding identification (DBID). We first show that if protocol participants have access to a directional antenna, many existing protocols that have been proven secure, will become insecure, and then show to revise the previous model to include this new capability of the users. DBID approach provides a natural way of modeling man-in-the-middle attack in line with identification protocols, as well as other attacks that are commonly considered in distance bounding protocols. We propose a new DBID scheme, called Poxy, with security proof. We compare the existing public key DB models, and prove the security of the scheme known as ProProx, in our model.

Category / Keywords: applications / Distance-Bounding, Public-Key Authentication, Directional Antenna

Original Publication (with minor differences): ICISSP 2017

Date: received 18 Apr 2018, last revised 19 May 2018

Contact author: ahmadi at ucalgary ca

Available format(s): PDF | BibTeX Citation

Note: In this paper we are adding another protocol, compared to the conference version.

Version: 20180519:210116 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]