Skip to main content
Top

1994 | OriginalPaper | Chapter

Distance-Bounding Protocols

Extended abstract

Authors : Stefan Brands, David Chaum

Published in: Advances in Cryptology — EUROCRYPT ’93

Publisher: Springer Berlin Heidelberg

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

It is often the case in applications of cryptographic protocols that one party would like to determine a practical upper-bound on the physical distance to the other party. For instance, when a person conducts a cryptographic identification protocol at an entrance to a building, the access control computer in the building would like to be ensured that the person giving the responses is no more than a few meters away.The “distance bounding” technique we introduce solves this problem by timing the delay between sending out a challenge bit and receiving back the corresponding response bit. It can be integrated into common identification protocols. The technique can also be applied in the three-party setting of “wallets with observers” in such a way that the intermediary party can prevent the other two from exchanging information, or even developing common coinflips.

Metadata
Title
Distance-Bounding Protocols
Authors
Stefan Brands
David Chaum
Copyright Year
1994
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/3-540-48285-7_30

Premium Partner