首页> 外文会议>International conference on cryptology in India >Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing
【24h】

Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing

机译:延迟身份验证:防止重播和中继攻击私人联系跟踪

获取原文

摘要

Currently several projects aim at designing and implementing protocols for privacy preserving automated contact tracing to help fight the current pandemic. Those proposal are quite similar, and in their most basic form basically propose an app for mobile phones which broadcasts frequently changing pseudorandom identifiers via (low energy) Bluetooth, and at the same time, the app stores IDs broadcast by phones in its proximity. Only if a user is tested positive, they upload either the beacons they did broadcast (which is the case in decentralized proposals as DP-3T, east and west coast PACT or Covid watch) or received (as in Popp-PT or ROBERT) during the last two weeks or so. Vaudenay [eprint 2020/399] observes that this basic scheme (he considers the DP-3T proposal) succumbs to relay and even replay attacks, and proposes more complex interactive schemes which prevent those attacks without giving up too many privacy aspects. Unfortunately interaction is problematic for this application for efficiency and security reasons. The countermeasures that have been suggested so far are either not practical or give up on key privacy aspects. We propose a simple non-interactive variant of the basic protocol that 1. (security) Provably prevents replay and (if location data is available) relay attacks. 2. (privacy) The data of all parties (even jointly) reveals no information on the location or time where encounters happened. 3. (efficiency) The broadcasted message can fit into 128 bits and uses only basic crypto (commitments and secret key authentication). Towards this end we introduce the concept of "delayed authentication", which basically is a message authentication code where verification can be done in two steps, where the first doesn't require the key, and the second doesn't require the message.
机译:目前,若干项目旨在设计和实施隐私保留自动联系跟踪的协议,以帮助对抗目前的大流行。这些提案非常相似,并且在最基本的形式中,基本上提出了一个用于通过(低能量)蓝牙频繁地广播伪随机标识符的移动电话的应用程序,同时该应用程序存储通过电话广播的IDS。只有当用户被测试正面时,他们才上传他们所做的信标的信标(这是DP-3T,东部和西部海岸协议或Covid手表的分散提案)或收到的(如Popp-Pt或Robert)过去两周左右。 vaudenay [ePrint 2020/399]观察到这一基本计划(他认为DP-3T提案)屈服于继电器,甚至重播攻击,并提出了更复杂的互动计划,防止这些攻击而不会放弃太多隐私方面。遗憾的是,效率和安全原因互动是有问题的。到目前为止所建议的对策是不实用的或放弃关键隐私方面。我们提出了一个简单的基本协议的非交互式变体,即1.(安全性)可否证明重播和(如果位置数据可用)中继攻击。 2.(隐私)所有各方的数据(甚至共同)没有关于发生遭遇发生的地点或时间的信息。 3.(效率)广播消息可以符合128位,仅使用基本的加密(承诺和密钥认证)。为此目的,我们介绍了“延迟认证”的概念,基本上是消息认证码,其中可以分两步完成验证,其中第一个不需要密钥,第二个不需要该消息。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号