Position-Based Cryptography from Noisy Channels

被引:0
|
作者
Dziembowski, Stefan [1 ]
Zdanowicz, Maciej [2 ]
机构
[1] Univ Warsaw, Inst Comp Sci, PL-00325 Warsaw, Poland
[2] Univ Warsaw, Inst Math, PL-00325 Warsaw, Poland
来源
PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014 | 2014年 / 8469卷
关键词
Position-based cryptography; information theoretic security;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We study the problem of constructing secure positioning protocols (Sastry et. al, 2003). Informally, the goal of such protocols is to enable a party P to convince a set of verifiers about P's location in space, using information about the time it takes P to respond to queries sent from different points. It has been shown by Chandran et al (2009) that in general such task is impossible to achieve if the adversary can position his stations in multiple points in space. Chandran et al proposed to overcome this impossibility result by moving to Maurer's bounded-storage model. Namely, they construct schemes that are secure under the assumption that the memory of the adversary is bounded. Later Buhrman et al (2010) considered secure positioning protocols schemes in quantum settings. In this paper we show how to construct secure positioning schemes in the so-called noisy channel scenario, i.e.: in the setting where the parties participating in a protocol have access to a source of random bits sent to them via independent noisy channels. We argue that for some practical applications such assumptions may be more realistic than those used before.
引用
收藏
页码:300 / 317
页数:18
相关论文
共 17 条
  • [1] POSITION-BASED QUANTUM CRYPTOGRAPHY: IMPOSSIBILITY AND CONSTRUCTIONS
    Buhrman, Harry
    Chandran, Nishanth
    Fehr, Serge
    Gelles, Ran
    Goyal, Vipul
    Ostrovsky, Rafail
    Schaffner, Christian
    SIAM JOURNAL ON COMPUTING, 2014, 43 (01) : 150 - 178
  • [2] Multiple-Valued Logic and Neural Network in the Position-Based Cryptography Scheme
    Alexey Yu. Bykovsky
    Journal of Russian Laser Research, 2021, 42 : 618 - 630
  • [3] A Multiple-Valued Logic for Implementing a Random Oracle and the Position-Based Cryptography
    Bykovsky, Alexey Yu.
    JOURNAL OF RUSSIAN LASER RESEARCH, 2019, 40 (02) : 173 - 183
  • [4] A Multiple-Valued Logic for Implementing a Random Oracle and the Position-Based Cryptography
    Alexey Yu. Bykovsky
    Journal of Russian Laser Research, 2019, 40 : 173 - 183
  • [5] Multiple-Valued Logic and Neural Network in the Position-Based Cryptography Scheme
    Bykovsky, Alexey Yu
    JOURNAL OF RUSSIAN LASER RESEARCH, 2021, 42 (05) : 618 - 630
  • [6] UC security model of position-based key exchange
    Zhang, J. (jwzhangxd@126.com), 1600, Science Press (51): : 353 - 359
  • [7] Secure Computation from Elastic Noisy Channels
    Khurana, Dakshita
    Maji, Hemanta K.
    Sahai, Amit
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 184 - 212
  • [8] Position based cryptography with location privacy: A step for Fog Computing
    Yang, Rupeng
    Xu, Qiuliang
    Au, Man Ho
    Yu, Zuoxia
    Wang, Hao
    Zhou, Lu
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 799 - 806
  • [9] Message Authentication over Noisy Channels
    Zheng, Fanfan
    Xiao, Zhiqing
    Zhou, Shidong
    Wang, Jing
    Huang, Lianfen
    ENTROPY, 2015, 17 (01) : 368 - 383
  • [10] Identity Authentication over Noisy Channels
    Zheng, Fanfan
    Xiao, Zhiqing
    Zhou, Shidong
    Wang, Jing
    Huang, Lianfen
    ENTROPY, 2015, 17 (07) : 4940 - 4958