Abstract
Position-based cryptography has attracted many researchers’ attention. In mobile Internet, there are lots of position-based security applications. In the paper, one new conception, positioning-protocol-based digital signature is proposed. Based on a secure positioning protocol, one model of positioning-protocol-based digital signature is proposed. In the model, the positioning protocol is bound to digital signature tightly, not loosely. Further, we propose one concrete positioning-protocol-based digital signature scheme and its correctness is proved.
Q. Xue — The paper is supported by NSFC under Grant No. 61170227, Ministry of Education Fund under Grant No. 14YJA880033, and Shanghai Projects under Grant No. 2013BTQ001, XZ201301 and 2013001.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chandran, N., Goyal, V., Moriarty, R., Ostrovsky, R.: Position based cryptography. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 391–407. Springer, Heidelberg (2009)
Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of the 2003 ACM Workshop on Wireless Security, WiSe 2003, pp. 1–10 (2003)
Singelee, D., Preneel, B.: Location verification using secure distance bounding protocols. In: IEEE Conference on Mobile Adhoc and Sensor Systems Conference (2005)
Bussard, L.: Trust establishment protocols for communicating devices. Ph.D. thesis, Eurecom-ENST (2004)
Capkun, S., Hubaux, J.P.: Secure positioning of wireless devices with application to sensor networks. In: IEEE INFOCOM, pp. 1917–1928 (2005)
Capkun, S., Cagalj, M., Srivastava, M.: Secure localization with hidden and mobile base stations. In: IEEE INFOCOM (2006)
Buhrman, H., Chandran, N., Fehr, S., Gelles, R., Goyal, V., Ostrovsky, R., Schaffner, C.: Position-based quantum cryptography: impossibility and constructions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 429–446. Springer, Heidelberg (2011)
Buhrman, H., Chandran, N., Fehr, S., Gelles, R., Goyal, V., Ostrovsky, R., Schaffner, C.: Position-based quantum cryptography: impossibility and constructions. In: CoRR abs/1009.2490 (2010)
Buhrman, H., Fehr, S., Schaffner, C., Speelman, F.: The Garden-Hose game: a new model of computation, and application to position-based quantum cryptography. In: CoRR abs/1109.2563 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Xue, Q., Li, F., Cao, Z. (2015). Positioning-Protocol-Based Digital Signature. In: Mumtaz, S., Rodriguez, J., Katz, M., Wang, C., Nascimento, A. (eds) Wireless Internet. WICON 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 146. Springer, Cham. https://doi.org/10.1007/978-3-319-18802-7_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-18802-7_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18801-0
Online ISBN: 978-3-319-18802-7
eBook Packages: Computer ScienceComputer Science (R0)