没有合适的资源?快使用搜索试试~ 我知道了~
基于安全定位协议的对称密码学
资源推荐
资源详情
资源评论
Secure-Positioning-Protocol-Based Symmetric
Cryptography
Qingshui Xue
Dept. of Computer Science and Engineering
Shanghai Jiao Tong University
Shanghai, China
xue-qsh@sjtu.edu.cn
Fengying Li
School of Continuous Education
Shanghai Jiao Tong University
Shanghai, China
Zhenfu Cao
Dept. of Computer Science and Engineering
Shanghai Jiao Tong University
Shanghai, China
zfcao@cs.sjtu.edu.cn
Abstract—Position-based cryptography has attracted lots of
researchers’ attention. In the mobile Internet, there are lots of
position-based security applications. For the first time, one new
conception, positioning-protocol-based symmetric cryptography
is proposed. Based on one secure positioning protocol, one
symmetric model is proposed. In the model, positioning protocols
are bound to symmetric cryptography tightly, not loosely.
Moreover, we propose one concrete positioning-protocol-based
symmetric scheme, its correctness is proved and its security is
simply analyzed as well. To our best knowledge, it is the first
positioning-protocol-based symmetric scheme.
Keywords-positioning protocol; symmetric cryptography; UC
security; model; scheme
I. INTRODUCTION
In the setting of the mobile Internet, position services and
position binding security applications become key
requirements, especially the latter. Position services include
position inquiring, secure positioning and so on. Position
inquiring consists of inquiring your own position and
positioning of other entities, which can be realized by
TOA/AOA/RMS (radio/light or sound), Camera, Sensor and so
forth [1-6]. The technology of inquiring your own position has
GPS (Global Positioning System) and so on. The technology of
positioning of other entities has Radar and so forth [2-6]. As we
all know, the positioning of other entities is a more challenging
one. Position binding security applications such as position-
based encryption and position-based signature and
authentication. For example, when one mobile user sends
messages to one specified position which is one either physical
or logical address (such as Internet Protocol address), it is
desirable that only the user who is indeed at that address can
receive it and decrypt messages. If the original receiver at that
position because of some reasons leaves that address, it will not
be able to receive or decrypt messages any more. In addition, if
the original receiver at that place moves to another place,
maybe he/she hopes he/she can receive messages at the new
place. Take position-based signature and authentication, for
example. One mobile or fixed user signs messages at one place
and sends them to another mobile user. The receiver can
receive the signed message and verify that received messages
are really signed at the place by the sender. Even if the signer
moves to another address, it will not influence the receiving
and verification of signed messages. On March 8 of 2014, the
missing Malaysian Airline MH370 can’t be found till now, as
reminds us of the significance of positioning and related
security applications.
Currently, research on position-based cryptography focuses
on secure positioning, about which some works had been
proposed [1]. These positioning protocols are based on one-
dimension, two-dimension or three-dimension spaces,
including traditional wireless network settings [1], as well as
quantum settings [7-9]. It seems to us that position-based
cryptography should integrate secure positioning with
cryptographic primitives. If only concentrating on positioning
protocols, perhaps we will become far away from position-
based cryptography. In other words, nowadays positioning
protocols are bound loosely with relevant security applications,
not tightly, as results in slow progresses of position-based
cryptography and applications. Resorting to the thoughts, in the
paper, our main contributions are as follows.
(1) We propose the definition and the model of positioning-
protocol-based symmetric cryptography. First, positioning-
protocol-based symmetric cryptography is a kind of symmetric
one, but a novel one. The definition is given and its model is
constructed. We define its security properties as well.
(2) To realize the kind of symmetric cryptography, one
secure-positioning-protocol-based symmetric scheme is
proposed and its security is analyzed in brief.
In the paper, we will organize the rest as follows. In Section
2, we will introduce the function of positioning protocols and
资源评论
weixin_38656989
- 粉丝: 3
- 资源: 935
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- keil2 + proteus + 8051.exe
- 1961ee27df03bd4595d28e24b00dde4e_744c805f7e4fb4d40fa3f695bfbab035_8(1).c
- mediapipe-0.9.0.1-cp37-cp37m-win-amd64.whl.zip
- windows注册表编辑工具
- mediapipe-0.9.0.1-cp37-cp37m-win-amd64.whl.zip
- 校园通行码预约管理系统20240522075502
- 车类型数据集6250张VOC+YOLO格式.zip
- The PyTorch implementation of STGCN.STGCN-main.zip
- 092300108.cpp
- 车类型数据集6000张VOC+YOLO格式.zip
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功