Distance-Bounding, Privacy-Preserving Attribute-Based Credentials

被引:0
|
作者
Bosk, Daniel [1 ]
Bouget, Simon [2 ]
Buchegger, Sonja [1 ]
机构
[1] KTH Royal Inst Technol, Stockholm, Sweden
[2] RISE Res Inst Sweden, Stockholm, Sweden
来源
基金
欧盟地平线“2020”;
关键词
SIGNATURE SCHEMES; PROOF;
D O I
10.1007/978-3-030-65411-5_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distance-bounding anonymous credentials could be used for any location proofs that do not need to identify the prover and thus could make even notoriously invasive mechanisms such as location-based services privacy-preserving. There is, however, no secure distance-bounding protocol for general attribute-based anonymous credentials. Brands and Chaum's (EUROCRYPT'93) protocol combining distance-bounding and Schnorr identification comes close, but does not fulfill the requirements of modern distance-bounding protocols. For that, we need a secure distance-bounding zero-knowledge proof-of-knowledge resisting mafia fraud, distance fraud, distance hijacking and terrorist fraud. Our approach is another attempt toward combining distance bounding and Schnorr to construct a distance-bounding zero-knowledge proof-of-knowledge. We construct such a protocol and prove it secure in the (extended) DFKO model for distance bounding. We also performed a symbolic verification of security properties needed for resisting these attacks, implemented in Tamarin. Encouraged by results from Singh et al. (NDSS'19), we take advantage of lessened constraints on how much can be sent in the fast phase of the distance-bounding protocol and achieve a more efficient protocol. We also provide a version that does not rely on being able to send more than one bit at a time which yields the same properties except for (full) terrorist fraud resistance.
引用
收藏
页码:147 / 166
页数:20
相关论文
共 50 条
  • [1] Privacy-Preserving Auditing for Attribute-Based Credentials
    Camenisch, Jan
    Lehmann, Anja
    Neven, Gregory
    Rial, Alfredo
    [J]. COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 109 - 127
  • [2] A Note on a Privacy-Preserving Distance-Bounding Protocol
    Aumasson, Jean-Philippe
    Mitrokotsa, Aikaterini
    Pens-Lopez, Pedro
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 78 - 92
  • [3] Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials
    Han, Jinguang
    Chen, Liqun
    Schneider, Steve
    Treharne, Helen
    Wesemeyer, Stephan
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (04) : 1836 - 1849
  • [4] Privacy-Preserving Distance-Bounding Proof-of-Knowledge
    Ahmadi, Ahmad
    Safavi-Naini, Reihaneh
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 74 - 88
  • [5] Privacy-Preserving Attribute-Based Credentials in Cooperative Intelligent Transport Systems
    Neven, Gregory
    Baldini, Gianmarco
    Camenisch, Jan
    Neisse, Ricardo
    [J]. 2017 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), 2017, : 131 - 138
  • [6] On the User Acceptance of Privacy-Preserving Attribute-Based Credentials - A Qualitative Study
    Sabouri, Ahmad
    [J]. DATA PRIVACY MANAGEMENT AND SECURITY ASSURANCE, 2016, 9963 : 130 - 145
  • [7] Concepts Around Privacy-Preserving Attribute-Based Credentials Making Authentication with Anonymous Credentials Practical
    Camenisch, Jan
    [J]. PRIVACY AND IDENTITY MANAGEMENT FOR EMERGING SERVICES AND TECHNOLOGIES, 2014, 421 : 53 - 63
  • [8] Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities
    de Fuentes, J. M.
    Gonzalez-Manzano, L.
    Serna-Olvera, J.
    Veseli, F.
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2017, 21 (05) : 869 - 891
  • [9] Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities
    J. M. de Fuentes
    L. González-Manzano
    J. Serna-Olvera
    F. Veseli
    [J]. Personal and Ubiquitous Computing, 2017, 21 : 869 - 891
  • [10] Concepts and languages for privacy-preserving attribute-based authentication
    Camenisch, Jan
    Dubovitskaya, Maria
    Enderlein, Robert R.
    Lehmann, Anja
    Neven, Gregory
    Paquin, Christian
    Preiss, Franz-Stefan
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 25 - 44