Skip to main content

Positioning-Protocol-Based Digital Signature

  • Conference paper
  • First Online:
Wireless Internet (WICON 2014)

Abstract

Position-based cryptography has attracted many researchers’ attention. In mobile Internet, there are lots of position-based security applications. In the paper, one new conception, positioning-protocol-based digital signature is proposed. Based on a secure positioning protocol, one model of positioning-protocol-based digital signature is proposed. In the model, the positioning protocol is bound to digital signature tightly, not loosely. Further, we propose one concrete positioning-protocol-based digital signature scheme and its correctness is proved.

Q. Xue — The paper is supported by NSFC under Grant No. 61170227, Ministry of Education Fund under Grant No. 14YJA880033, and Shanghai Projects under Grant No. 2013BTQ001, XZ201301 and 2013001.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chandran, N., Goyal, V., Moriarty, R., Ostrovsky, R.: Position based cryptography. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 391–407. Springer, Heidelberg (2009)

    Google Scholar 

  2. Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of the 2003 ACM Workshop on Wireless Security, WiSe 2003, pp. 1–10 (2003)

    Google Scholar 

  3. Singelee, D., Preneel, B.: Location verification using secure distance bounding protocols. In: IEEE Conference on Mobile Adhoc and Sensor Systems Conference (2005)

    Google Scholar 

  4. Bussard, L.: Trust establishment protocols for communicating devices. Ph.D. thesis, Eurecom-ENST (2004)

    Google Scholar 

  5. Capkun, S., Hubaux, J.P.: Secure positioning of wireless devices with application to sensor networks. In: IEEE INFOCOM, pp. 1917–1928 (2005)

    Google Scholar 

  6. Capkun, S., Cagalj, M., Srivastava, M.: Secure localization with hidden and mobile base stations. In: IEEE INFOCOM (2006)

    Google Scholar 

  7. Buhrman, H., Chandran, N., Fehr, S., Gelles, R., Goyal, V., Ostrovsky, R., Schaffner, C.: Position-based quantum cryptography: impossibility and constructions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 429–446. Springer, Heidelberg (2011)

    Google Scholar 

  8. Buhrman, H., Chandran, N., Fehr, S., Gelles, R., Goyal, V., Ostrovsky, R., Schaffner, C.: Position-based quantum cryptography: impossibility and constructions. In: CoRR abs/1009.2490 (2010)

    Google Scholar 

  9. Buhrman, H., Fehr, S., Schaffner, C., Speelman, F.: The Garden-Hose game: a new model of computation, and application to position-based quantum cryptography. In: CoRR abs/1109.2563 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qingshui Xue .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Xue, Q., Li, F., Cao, Z. (2015). Positioning-Protocol-Based Digital Signature. In: Mumtaz, S., Rodriguez, J., Katz, M., Wang, C., Nascimento, A. (eds) Wireless Internet. WICON 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 146. Springer, Cham. https://doi.org/10.1007/978-3-319-18802-7_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-18802-7_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-18801-0

  • Online ISBN: 978-3-319-18802-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics