Skip to main content
Log in

Universally composable secure positioning in the bounded retrieval model

有界提取模型下通用可组合的安全定位

  • Research Paper
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

The universal composition security of secure positioning, which is a vital primitive in position-based cryptography, is investigated in this paper. This paper proposes a universally composable secure positioning model, which is a bounded retrieval model (F BRM) with the ideal functionalities of secure positioning (F dSP ). Then, a one-dimensional version of a novel secure positioning protocol SPreg1 is presented, which is universally composable and is secure in the (F REG, F BRM)-hybrid model. Protocol SPreg1 additionally offers verifier authentication properties, as opposed to similar existing secure positioning protocols. Lastly, a generic version of the secure positioning protocol SPregd in d dimensions is proposed based on the protocol SPreg1. In summary, the proposed secure positioning protocols have been proved to be secure in the universally composable framework.

摘要

创新点

安全定位协议是位置密码学中最基础、最重要的协议之一。本文在通用可组合框架下, 建立了通用可组合的安全定位模型, 提出了安全定位的理想函数( FSP) 和有界提取模型( BRM模型) 的理想函数( FBRM) 。在BRM模型下, 提出了一个1维空间下的安全定位协议, 并将协议扩展到2维( 或 3维) 空间。所提出的协议满足UC安全, 也实现了Prover对Verifier消息的认证, 有效抵御攻击者伪造Verifier的消息进而发起的Dos攻击。

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Vora A, Nesterenko M. Secure location verification using radio broadcast. IEEE Trans Depend Secur Comput, 2006, 3: 377–385

    Article  Google Scholar 

  2. Zhang S L, Zhang Q, Liu M Q, et al. A top-down positioning scheme for underwater wireless sensor networks. Sci China Inf Sci, 2014, 57: 032301

  3. Li J Z, Guo F C, Jiang W L. Source localization and calibration using TDOA and FDOA measurements in the presence of sensor location uncertainty. Sci China Inf Sci, 2014, 57: 042315

  4. Gezici S. A survey on wireless position estimation. Wirel Pers Commun, 2008, 44: 263–282

    Article  Google Scholar 

  5. Chandran N, Goyal V, Moriarty R, et al. Position based cryptography. In: Proceedings of 29th Annual International Cryptology Conference, Santa Barbara, 2009. 391–407

    Google Scholar 

  6. Dziembowski S, Sapienza L, Pietrzak K. Leakage-resilient cryptography. In: Proceedings of 49th Annual IEEE Symposium on Foundations of Computer Science, Philadelphia, 2008. 293–302

    Google Scholar 

  7. Buhrman H, Chandran N, Fehr S, et al. Position based quantum cryptography: impossibility and constructions. In: Proceedings of 31st Annual Cryptology Conference, Santa Barbara, 2011. 429–446

    Google Scholar 

  8. Zhang H J, Zhang Z Y, Cao Z F. Position-verification in multi-channel model. Cryptology ePrint Archive, Report 2011/714, http://eprint.iacr.org/2011/714.pdf. 2011

    Google Scholar 

  9. Canetti R. Universally composable security: a new paradigm for cryptographic protocols. In: Proceedings of 42nd Annual Symposium on Foundations of Computer Science, Las Vegas, 2001. 136–145

    Google Scholar 

  10. Canetti R, Krawczyk H. Universally composable notions of key exchange and secure channels. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, 2002. 337–351

    Google Scholar 

  11. Zhang J W, Ma J F, Moon S J. Universally composable one-time signature and broadcast authentication. Sci China Inf Sci, 2010, 53: 567–580

    Article  MathSciNet  Google Scholar 

  12. Zhang J W, Ma J F, Moon S J. Universally composable secure TNC model and EAP-TNC protocol in IF-T. Sci China Inf Sci, 2010, 53: 465–482

    Article  MathSciNet  Google Scholar 

  13. Dziembowski S. Intrusion-resilience via the bounded-storage model. In: Proceedings of 3rd Theory of Cryptography Conference, New York, 2006. 207–224

    Chapter  Google Scholar 

  14. Dziembowski S, Pietrzak K. Intrusion-resilient secret sharing. In: Proceedings of 48th Annual IEEE Symposium on Foundations of Computer Science, Providence, 2007. 227–237

    Google Scholar 

  15. Zhang J W, Ma J F, Yang C. UC model of secure positioning protocols (in Chinese). J Commun, 2013, 34: 117–122

    Google Scholar 

  16. Naor M, Yung M. Universal one-way hash functions and their cryptographic applications. In: Proceedings of 21st Annual ACM Symposium on Theory of Computing, Seattle, 1989. 33–43

    Google Scholar 

  17. He C H, Sundararajan M, Datta A, et al. A modular correctness proof of IEEE 802.11i and TLS. In: Proceedings of 12th ACM Conference on Computer and Communications Security, Alexandria, 2005. 2–15

    Chapter  Google Scholar 

  18. Hu Y, Jakobsson M, Perrig A. Efficient constructions for one-way hash chains. In: Proceedings of 3rd International Conference on Applied Cryptography and Network Security, New York, 2005. 423–441

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to JunWei Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, J., Ma, J., Yang, C. et al. Universally composable secure positioning in the bounded retrieval model. Sci. China Inf. Sci. 58, 1–15 (2015). https://doi.org/10.1007/s11432-015-5412-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-015-5412-9

Keywords

关键词

Navigation