Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks
DOI: 10.1109/wowmom.2005.60
|View full text |Cite
|
Sign up to set email alerts
|

Location Privacy through Secret Sharing Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 24 publications
(18 citation statements)
references
References 15 publications
0
18
0
Order By: Relevance
“…In Marias et al (2005) we have further elaborated on the proposed architecture, evaluating the potential threats and its robustness against brute-force and sophisticated attacks, and we have proved that the STS architecture is stealth against such attacks. If y = 7 is minimum number of STS servers needed to rebuild the location information, z = 10 is the STS servers under attack and m = 20 is the total number of STS servers, the attacker must try an average of 5 · 10 29 combinations in order to find out if the location segments obtained from the z servers are sufficient to rebuild the location information of any (and not specific) user.…”
Section: Experiments and Threats Analysis Against Stsmentioning
confidence: 99%
See 2 more Smart Citations
“…In Marias et al (2005) we have further elaborated on the proposed architecture, evaluating the potential threats and its robustness against brute-force and sophisticated attacks, and we have proved that the STS architecture is stealth against such attacks. If y = 7 is minimum number of STS servers needed to rebuild the location information, z = 10 is the STS servers under attack and m = 20 is the total number of STS servers, the attacker must try an average of 5 · 10 29 combinations in order to find out if the location segments obtained from the z servers are sufficient to rebuild the location information of any (and not specific) user.…”
Section: Experiments and Threats Analysis Against Stsmentioning
confidence: 99%
“…LocInfo is changed go to step 5 4), and to enter Phevos pseudonymÕs segments to the x STS servers. This procedure requires a handshake between the user and each STS server, which is further discussed in Marias et al (2005).…”
Section: Registration To the Sts Servicementioning
confidence: 99%
See 1 more Smart Citation
“…Symmetric encryption techniques are usually used. To deal with the problem of untrusted TTP, (Marias, Delakouridis, Kazatzopoulos, & Georgiadis, 2005) proposed a secret sharing based approach, where the shares are distributed among many untrusted TTP. Thus, to retrieve the true position, you need all the shares.…”
Section: Cryptographymentioning
confidence: 99%
“…Using this approach, a location-based server is supposed to answer the user queries but it has no information about the user's location due to encrypted data communication between the nodes that only know the way to decrypt the message. Another approach proposed by Marias et al (Marias, G. F., Delakouridis, C., Kazatzopoulos, L., & Georgiadis, P., 2005) has introduced the idea of distributed sharing of user's location information on different servers for privacy. To retrieve the exact information, the user need to recollect all the shares distributed on different servers.…”
Section: Introductionmentioning
confidence: 99%