2009
DOI: 10.1007/978-3-642-03356-8_23
|View full text |Cite
|
Sign up to set email alerts
|

Position Based Cryptography

Abstract: We consider what constitutes identities in cryptography. Typical examples include your name and your social-security number, or your fingerprint/iris-scan, or your address, or your (non-revoked) publickey coming from some trusted public-key infrastructure. In many situations, however, where you are defines your identity. For example, we know the role of a bank-teller behind a bullet-proof bank window not because she shows us her credentials but by merely knowing her location. In this paper, we initiate the stu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
167
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 112 publications
(167 citation statements)
references
References 23 publications
(9 reference statements)
0
167
0
Order By: Relevance
“…In the literature, this family is often considered in the single qubit case, for instance with U = {id, H} where H is the Hadamard gate [1,9,16]. Then it makes sense to repeat the protocol n times in order to build some statistics.…”
Section: A Formal Description Of the Position-verification Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…In the literature, this family is often considered in the single qubit case, for instance with U = {id, H} where H is the Hadamard gate [1,9,16]. Then it makes sense to repeat the protocol n times in order to build some statistics.…”
Section: A Formal Description Of the Position-verification Protocolsmentioning
confidence: 99%
“…Position verification protocols have been studied in the classical setting where the challenges are described by classical information, and it was shown in [1] that information-theoretic security could never be obtained in the standard (Vanilla) model. More precisely, it is always possible for a coalition of adversaries to convince the verifiers, even if none of the adversaries sits in the spatio-temporal region where the prover is supposed to be.…”
Section: Introductionmentioning
confidence: 99%
“…To the best of our knowledge, all existing solutions employ trusted network/localization infrastructure [3,4,10,11,12,13,14] to detect malicious users claiming false locations. Most of these solutions use distance bounding techniques, in which a beacon acting as verifier challenges the mobile device and measures the elapsed time until the receipt of its response.…”
Section: Related Workmentioning
confidence: 99%
“…Most prominently, the recent position-based cryptography work [14] aims to determine if a prover is (exactly) at a claimed position -but in a single protocol run, with many verifiers. This is clearly different from Mafia fraud or terrorist fraud attacks.…”
Section: Introductionmentioning
confidence: 99%
“…This is clearly different from Mafia fraud or terrorist fraud attacks. As adversaries in [14] must all have the same knowledge as the prover (also knowledge of the private key), this model is closest to our distance fraud model, where tags must prove they are closer to the reader than they really are. However, exact positioning is impossible in practice for RFID, requiring too many readers to deal with the high variance in response time.…”
Section: Introductionmentioning
confidence: 99%