کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
4950206 1364281 2018 28 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Position based cryptography with location privacy: A step for Fog Computing
ترجمه فارسی عنوان
رمزنگاری مبتنی بر موقعیت با حریم خصوصی موقعیت: گام برای محاسبات مه
کلمات کلیدی
محاسبات مه تأیید مکان حریم خصوصی محل سکونت، رمزگذاری مبتنی بر موقعیت مدل بازیابی محدود
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر نظریه محاسباتی و ریاضیات
چکیده انگلیسی
In this paper, we solve this problem by giving constructions of secure positioning protocol with location privacy in the bounded retrieval model. More precisely, we first explore how to define location privacy, which requires that nearly all parties except the prover, including verifiers and outside attackers, cannot learn any additional information about the exact position of the prover, for secure positioning protocol in the bounded retrieval model. Then we illustrate how to construct protocols satisfying this definition. In particular, we present a construction in the one-dimension setting, which explains the basic idea of our construction, and a construction in the three-dimensions setting, which can capture most practical scenarios. Amazingly, privacy is achieved without introducing additional computation overhead, and our system is as efficient as the one constructed in Chandran et al. (CRYPTO 2009). Besides, based on our proposed secure positioning protocols with location privacy, we also build more advanced cryptographic protocols exploiting location verification, e.g., position based key exchange, position based multi-party computation, position based public key infrastructure, etc., all of which still preserve the location privacy. Finally, we also give a proof of concept implementation of our system, which demonstrates that our system is quite practical in practice.
ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Future Generation Computer Systems - Volume 78, Part 2, January 2018, Pages 799-806
نویسندگان
, , , , , ,