Privacy-preserving Distributed Location Proof Generating System  被引量:3

Privacy-preserving Distributed Location Proof Generating System

在线阅读下载全文

作  者:LIU Mengjun LIU Shubo ZHANG Rui Li Yongkai WANG Jun CAO Hui 

机构地区:[1]Key Laboratory of Aerospace Information security and trusted computing Ministry of Education, Wuhan University [2]School of computer, Wuhan University [3]Department of Electronic Engineering, University of Hawaii

出  处:《China Communications》2016年第3期203-218,共16页中国通信(英文版)

基  金:supported by the National Natural Science Foundation of China(Grant No.41371402);the National Basic Research Program of China("973"Program)(Grant No.2011CB302306);the Fundamental Research Funds for the Central University(Grant No.2015211020201 and No.211274230)

摘  要:The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, preventing users from colluding with each other to create fake location proofs and protecting user's location privacy at the same time, are the main technical challenges to bring this kind of LBS into practical. Existing solutions tackle these challenges with low collusion-detecting efficiency and defected collusion-detecting method. We proposed two novel location proof generating schemes, which inversely utilized a secure secret-sharing scheme and a pseudonym scheme to settle these shortcomings. Our proposed solution resists and detects user collusion attacks in a more efficient and correct way. Meanwhile, we achieve a higher level of location privacy than that of previous work. The correctness and efficiency of our proposed solution is testified by intensive security analysis, performance analysis, as well as experiments and simulation results.The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, preventing users from colluding with each other to create fake location proofs and protecting user's location privacy at the same time, are the main technical challenges to bring this kind of LBS into practical. Existing solutions tackle these challenges with low collusion-detecting efficiency and defected collusion-detecting method. We proposed two novel location proof generating schemes, which inversely utilized a secure secret-sharing scheme and a pseudonym scheme to settle these shortcomings. Our proposed solution resists and detects user collusion attacks in a more efficient and correct way. Meanwhile, we achieve a higher level of location privacy than that of previous work. The correctness and efficiency of our proposed solution is testified by intensive security analysis, performance analysis, as well as experiments and simulation results.

关 键 词:computer software and theory location proof secret-sharing location privacy 

分 类 号:TP309[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象