A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol

@inproceedings{Bultel2016APA,
  title={A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol},
  author={Xavier Bultel and S{\'e}bastien Gambs and David Gerault and Pascal Lafourcade and Cristina Onete and Jean-Marc Robert},
  booktitle={WISEC},
  year={2016}
}
Contactless communications have become omnipresent in our daily lives, from simple access cards to electronic passports. Such systems are particularly vulnerable to relay attacks, in which an adversary relays the messages from a prover to a verifier. Distance-bounding protocols were introduced to counter such attacks. Lately, there has been a very active research trend on improving the security of these protocols, but also on ensuring strong privacy properties with respect to active adversaries… CONTINUE READING

Citations

Publications citing this paper.

References

Publications referenced by this paper.
Showing 1-3 of 3 references

Distance-Bounding Protocols (Extended Abstract)

EUROCRYPT • 1993
View 4 Excerpts
Highly Influenced

Private and Secure Public-Key Distance Bounding - Application to NFC Payment

Financial Cryptography • 2015
View 7 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…