2017
DOI: 10.1007/978-3-319-62024-4_11
|View full text |Cite
|
Sign up to set email alerts
|

Towards Quantum Distance Bounding Protocols

Abstract: Abstract. Distance Bounding (DB) is a security technique through which it is possible to determine an upper-bound on the physical distance between two parties (denoted as verifier and prover). These protocols typically combine physical properties of the communication channel with cryptographic challenge-response schemes. A key challenge to design secure DB protocols is to keep the time required by the prover to process the challenges and compute and transmit the responses as low as possible. For this purpose, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…We also proposed a new simple and secure high-level design that lifts the important DB assumption of no cryptographic operations during the timed phase. We believe that such protocols are the future of DB, alongside other promising candidates such as quantum distance bounding [1].…”
Section: Discussionmentioning
confidence: 99%
“…We also proposed a new simple and secure high-level design that lifts the important DB assumption of no cryptographic operations during the timed phase. We believe that such protocols are the future of DB, alongside other promising candidates such as quantum distance bounding [1].…”
Section: Discussionmentioning
confidence: 99%
“…Since this work is on relay attack detection using qubits, we only present DB protocols that use qubits. To the best of the author's knowledge, there are two recently proposed DB protocols [16,17] that employ qubits instead of classical bits for the challenge-response.…”
Section: Related Workmentioning
confidence: 99%
“…Figures 6 and 7 illustrates the protocols in [16,17], respectively. As can be seen from the figures, the protocol in [16] comprises also of a third phase in which the tag sends a Message Authentication Code (MAC) tag of a message composed of the measured challenges, nonces exchanged in the initialisation phase, and both the reader and the tag's IDs.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations