Position based key exchange:definitions and implementations  

在线阅读下载全文

作  者:ZHANG Junwei DU Fangqiong MA Jianfeng YANG Chao 

机构地区:[1]School of Cyber Engineering,Xidian University,Xi’an 710071,China

出  处:《Journal of Communications and Information Networks》2016年第4期33-43,共11页通信与信息网络学报(英文)

基  金:This work is supported by the National High Technology Research and Development Program of China(863 Program)(No.2015AA016007);the National Natural Science Foundation of China(Nos.U1405255,61472310,61372075).

摘  要:Chandran,et al.introduce the direction of position based cryptography at CRYPTO 2009.In position based cryptography,the position of a party is used to be its unique“credential”in order to realize the cryptographic tasks,such as position based encryption,position based signature,position based key exchange and so on.Position based key exchange,as a basic primitive in position based cryptography,can be used to establish a shared key based on the position of the participant.To begin with,this paper presents the notions of the prover-to-verifier mode and the prover-to-prover mode for position based key exchange.In the prover-to-verifier mode,a secret key can be shared between a prover and the verifiers according to the position of the prover.While in the prover-to-prover mode,two provers located at the valid positions can negotiate a shared key with the help of the verifiers and any other party whose position is illegal cannot obtain the shared key.At the same time,this paper formalizes two security definitions against colluding adversaries:position based prover-to-verifier key exchange and position based prover-to-prover key exchange.Then,this paper introduces the bounded retrieval model and the implementations of position based key exchange in two modes based on the bounded retrieval model.Finally,this paper discusses the position based key exchange protocols in two modes from both security and performance perspectives.

关 键 词:position based key exchange position based cryptography prover-to-verifier prover-to-prover bounded retrieval model 

分 类 号:TP3[自动化与计算机技术—计算机科学与技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象