【24h】

Position Based Cryptography

机译:基于位置的密码学

获取原文
获取原文并翻译 | 示例

摘要

We consider what constitutes identities in cryptography. Typical examples include your name and your social-security number, or your fmgerprint/iris-scan, or your address, or your (non-revoked) public-key coming from some trusted public-key infrastructure. In many situations, however, where you are defines your identity. For example, we know the role of a bank-teller behind a bullet-proof bank window not because she shows us her credentials but by merely knowing her location. In this paper, we initiate the study of cryptographic protocols where the identity (or other credentials and inputs) of a party are derived from its geographic location.rnWe start by considering the central task in this setting, i.e., securely verifying the position of a device. Despite much work in this area, we show that in the Vanilla (or standard) model, the above task (i.e., of secure positioning) is impossible to achieve. In light of the above impossibility result, we then turn to the Bounded Storage Model and formalize and construct information theoretically secure protocols for two fundamental tasks:rn1. Secure Positioning; andrn2. Position Based Key Exchange.rnWe then show that these tasks are in fact universal in this setting we show how we can use them to realize Secure Multi-Party Computation. Our main contribution in this paper is threefold: to place the problem of secure positioning on a sound theoretical footing; to prove a strong impossibility result that simultaneously shows the insecurity of previous attempts at the problem; and to present positive results by showing that the bounded-storage framework is, in fact, one of the "right" frameworks (there may be others) to study the foundations of position-based cryptography.
机译:我们考虑什么构成密码学中的身份。典型示例包括您的姓名和社会安全号码,指纹或虹膜扫描或地址,或者您的(未撤销的)公钥来自某些受信任的公钥基础结构。但是,在许多情况下,您要在其中定义您的身份。例如,我们知道在防弹银行窗口后面的银行柜员的作用,不是因为她向我们显示了她的凭据,而是仅仅知道了她的位置。在本文中,我们启动了对密码协议的研究,在该协议中,一方的身份(或其他凭据和输入)是从其地理位置得出的。rn我们首先考虑在这种情况下的中心任务,即安全地验证用户的位置。设备。尽管在此领域进行了大量工作,但我们显示在Vanilla(或标准)模型中,上述任务(即安全定位)无法实现。鉴于上述不可能的结果,我们接着转向有界存储模型,并针对两个基本任务对信息安全理论进行形式化和构造:rn1。安全定位;安德鲁2。基于位置的密钥交换。然后,我们说明这些任务实际上在这种情况下是通用的,我们说明了如何使用它们来实现安全的多方计算。我们在本文中的主要贡献是三方面的:将安全定位问题放在合理的理论基础上;证明强烈的不可能结果,同时表明先前对该问题的尝试是不安全的;并通过证明有界存储框架实际上是研究基于位置的密码学基础的“正确”框架之一(可能还有其他)来给出积极的结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号