Distance-bounding, privacy-preserving attribute-based credentials
2020 (English)In: International Conference on Cryptology and Network SecurityCANS 2020: Cryptology and Network Security, Springer Science and Business Media Deutschland GmbH , 2020, p. 147-166Conference paper, Published paper (Refereed)
Abstract [en]
Distance-bounding anonymous credentials could be used for any location proofs that do not need to identify the prover and thus could make even notoriously invasive mechanisms such as location-based services privacy-preserving. There is, however, no secure distance-bounding protocol for general attribute-based anonymous credentials. Brands and Chaum’s (EUROCRYPT’93) protocol combining distance-bounding and Schnorr identification comes close, but does not fulfill the requirements of modern distance-bounding protocols. For that, we need a secure distance-bounding zero-knowledge proof-of-knowledge resisting mafia fraud, distance fraud, distance hijacking and terrorist fraud. Our approach is another attempt toward combining distance bounding and Schnorr to construct a distance-bounding zero-knowledge proof-of-knowledge. We construct such a protocol and prove it secure in the (extended) DFKO model for distance bounding. We also performed a symbolic verification of security properties needed for resisting these attacks, implemented in Tamarin. Encouraged by results from Singh et al. (NDSS’19), we take advantage of lessened constraints on how much can be sent in the fast phase of the distance-bounding protocol and achieve a more efficient protocol. We also provide a version that does not rely on being able to send more than one bit at a time which yields the same properties except for (full) terrorist fraud resistance.
Place, publisher, year, edition, pages
Springer Science and Business Media Deutschland GmbH , 2020. p. 147-166
Series
Part of the Lecture Notes in Computer Science book series (LNCS, volume 12579)
Keywords [en]
Cryptography, Location based services, Privacy by design, Telecommunication services, Terrorism, Anonymous credential, Distance bounding protocols, Efficient protocols, General attributes, Privacy preserving, Security properties, Symbolic verification, Zero knowledge proof, Network security
National Category
Natural Sciences
Identifiers
URN: urn:nbn:se:ri:diva-51963DOI: 10.1007/978-3-030-65411-5_8Scopus ID: 2-s2.0-85098261202ISBN: 9783030654108 (print)OAI: oai:DiVA.org:ri-51963DiVA, id: diva2:1520861
Conference
International Conference on Cryptology and Network Security CANS 2020: Cryptology and Network Security 14 December 2020 through 16 December 2020.
Note
Funding details: Stiftelsen för Strategisk Forskning, SSF, SSF FFL09-0086, 830927; Funding text 1: D. Bosk—Thanks to Sébastien Gambs (UQAM), Cristina Onete (Univ. Limoges) and Douglas Wikström (KTH) for valuable discussions. Thanks to Mats Näslund (FRA, KTH) for reading the draft and pointing out several mistakes. Part of the work done while visiting the WIDE team in Inria/CNRS/IRISA/Univ. Rennes. Supported by the Swedish Foundation for Strategic Research grant SSF FFL09-0086. S. Bouget—Supported by the funding for H2020 project CONCORDIA (Grant Agreement No. 830927). Part of the work done while at KTH, funded by the Swdish Foundation for Strategic Research, grant SSF FFL09-0086. S. Buchegger—Supported by the Swedish Foundation for Strategic Research grant SSF FFL09-0086.
2021-01-212021-01-212023-06-08Bibliographically approved