Abstract
The universal composition security of secure positioning, which is a vital primitive in position-based cryptography, is investigated in this paper. This paper proposes a universally composable secure positioning model, which is a bounded retrieval model (F BRM) with the ideal functionalities of secure positioning (F dSP ). Then, a one-dimensional version of a novel secure positioning protocol SPreg1 is presented, which is universally composable and is secure in the (F REG, F BRM)-hybrid model. Protocol SPreg1 additionally offers verifier authentication properties, as opposed to similar existing secure positioning protocols. Lastly, a generic version of the secure positioning protocol SPregd in d dimensions is proposed based on the protocol SPreg1. In summary, the proposed secure positioning protocols have been proved to be secure in the universally composable framework.
摘要
创新点
安全定位协议是位置密码学中最基础、最重要的协议之一。本文在通用可组合框架下, 建立了通用可组合的安全定位模型, 提出了安全定位的理想函数( FSP) 和有界提取模型( BRM模型) 的理想函数( FBRM) 。在BRM模型下, 提出了一个1维空间下的安全定位协议, 并将协议扩展到2维( 或 3维) 空间。所提出的协议满足UC安全, 也实现了Prover对Verifier消息的认证, 有效抵御攻击者伪造Verifier的消息进而发起的Dos攻击。
Similar content being viewed by others
References
Vora A, Nesterenko M. Secure location verification using radio broadcast. IEEE Trans Depend Secur Comput, 2006, 3: 377–385
Zhang S L, Zhang Q, Liu M Q, et al. A top-down positioning scheme for underwater wireless sensor networks. Sci China Inf Sci, 2014, 57: 032301
Li J Z, Guo F C, Jiang W L. Source localization and calibration using TDOA and FDOA measurements in the presence of sensor location uncertainty. Sci China Inf Sci, 2014, 57: 042315
Gezici S. A survey on wireless position estimation. Wirel Pers Commun, 2008, 44: 263–282
Chandran N, Goyal V, Moriarty R, et al. Position based cryptography. In: Proceedings of 29th Annual International Cryptology Conference, Santa Barbara, 2009. 391–407
Dziembowski S, Sapienza L, Pietrzak K. Leakage-resilient cryptography. In: Proceedings of 49th Annual IEEE Symposium on Foundations of Computer Science, Philadelphia, 2008. 293–302
Buhrman H, Chandran N, Fehr S, et al. Position based quantum cryptography: impossibility and constructions. In: Proceedings of 31st Annual Cryptology Conference, Santa Barbara, 2011. 429–446
Zhang H J, Zhang Z Y, Cao Z F. Position-verification in multi-channel model. Cryptology ePrint Archive, Report 2011/714, http://eprint.iacr.org/2011/714.pdf. 2011
Canetti R. Universally composable security: a new paradigm for cryptographic protocols. In: Proceedings of 42nd Annual Symposium on Foundations of Computer Science, Las Vegas, 2001. 136–145
Canetti R, Krawczyk H. Universally composable notions of key exchange and secure channels. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, 2002. 337–351
Zhang J W, Ma J F, Moon S J. Universally composable one-time signature and broadcast authentication. Sci China Inf Sci, 2010, 53: 567–580
Zhang J W, Ma J F, Moon S J. Universally composable secure TNC model and EAP-TNC protocol in IF-T. Sci China Inf Sci, 2010, 53: 465–482
Dziembowski S. Intrusion-resilience via the bounded-storage model. In: Proceedings of 3rd Theory of Cryptography Conference, New York, 2006. 207–224
Dziembowski S, Pietrzak K. Intrusion-resilient secret sharing. In: Proceedings of 48th Annual IEEE Symposium on Foundations of Computer Science, Providence, 2007. 227–237
Zhang J W, Ma J F, Yang C. UC model of secure positioning protocols (in Chinese). J Commun, 2013, 34: 117–122
Naor M, Yung M. Universal one-way hash functions and their cryptographic applications. In: Proceedings of 21st Annual ACM Symposium on Theory of Computing, Seattle, 1989. 33–43
He C H, Sundararajan M, Datta A, et al. A modular correctness proof of IEEE 802.11i and TLS. In: Proceedings of 12th ACM Conference on Computer and Communications Security, Alexandria, 2005. 2–15
Hu Y, Jakobsson M, Perrig A. Efficient constructions for one-way hash chains. In: Proceedings of 3rd International Conference on Applied Cryptography and Network Security, New York, 2005. 423–441
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhang, J., Ma, J., Yang, C. et al. Universally composable secure positioning in the bounded retrieval model. Sci. China Inf. Sci. 58, 1–15 (2015). https://doi.org/10.1007/s11432-015-5412-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11432-015-5412-9
Keywords
- secure positioning
- position-based cryptography
- universally composable
- bounded retrieval model
- ideal functionality