2015
DOI: 10.1007/978-3-319-21966-0_7
|View full text |Cite
|
Sign up to set email alerts
|

Distance Lower Bounding

Abstract: Abstract. Distance (upper)-bounding (DUB) allows a verifier to know whether a proving party is located within a certain distance bound. DUB protocols have many applications in secure authentication and location based services. We consider the dual problem of distance lower bounding (DLB), where the prover proves it is outside a distance bound to the verifier. We motivate this problem through a number of application scenarios, and model security against distance fraud (DF), Man-in-theMiddle (MiM), and collusion… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 28 publications
(62 reference statements)
0
1
0
Order By: Relevance
“…However, studying a number of different attacks about protocols [44], [57], [52], [46], [48], Buhrman et al [6] cited in [23], [24] concluded that the safe positioning (location-verification) task, as well as cryptography based on position, are unattainable in cases where the involved parties exchange quantum data. Although studies such as [6], [23], [57], [52], [33], [38], [58] have mentioned that it is impossible to propose secure position-based cryptography in a typical model or quantum model without constraints, we can propose a secure and advanced position-driven cryptosystem without any constraint by using the lattice problem for the Internet of Moving Things (IoMT) in the pre-and postquantum world and simultaneously resisting quantum attacks and flaws. The proposed cryptographic protocol in this research not only solves the abovementioned problems but also improves the security of wireless networks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, studying a number of different attacks about protocols [44], [57], [52], [46], [48], Buhrman et al [6] cited in [23], [24] concluded that the safe positioning (location-verification) task, as well as cryptography based on position, are unattainable in cases where the involved parties exchange quantum data. Although studies such as [6], [23], [57], [52], [33], [38], [58] have mentioned that it is impossible to propose secure position-based cryptography in a typical model or quantum model without constraints, we can propose a secure and advanced position-driven cryptosystem without any constraint by using the lattice problem for the Internet of Moving Things (IoMT) in the pre-and postquantum world and simultaneously resisting quantum attacks and flaws. The proposed cryptographic protocol in this research not only solves the abovementioned problems but also improves the security of wireless networks.…”
Section: Literature Reviewmentioning
confidence: 99%