Position-Based Cryptography from Noisy Channels
- 1.1k Downloads
We study the problem of constructing secure positioning protocols (Sastry et. al, 2003). Informally, the goal of such protocols is to enable a party P to convince a set of verifiers about P’s location in space, using information about the time it takes P to respond to queries sent from different points. It has been shown by Chandran et al (2009) that in general such task is impossible to achieve if the adversary can position his stations in multiple points in space. Chandran et al proposed to overcome this impossibility result by moving to Maurer’s bounded-storage model. Namely, they construct schemes that are secure under the assumption that the memory of the adversary is bounded. Later Buhrman et al (2010) considered secure positioning protocols schemes in quantum settings.
In this paper we show how to construct secure positioning schemes in the so-called noisy channel scenario, i.e.: in the setting where the parties participating in a protocol have access to a source of random bits sent to them via independent noisy channels. We argue that for some practical applications such assumptions may be more realistic than those used before.
KeywordsPosition-based cryptography information theoretic security
Unable to display preview. Download preview PDF.
- 3.Capkun, S., Hubaux, J.P.: Secure positioning of wireless devices with application to sensor networks. In: INFOCOM 2005, Proceedings of the IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1917–1928. IEEE (2005)Google Scholar
- 5.Dolev, D., Dwork, C., Naor, M.: Nonmalleable cryptography. SIAM Review 45(4), 727–784 (2003)Google Scholar
- 6.Dubhashi, D.P., Panconesi, A.: Concentration of Measure for the Analysis of Randomized Algorithms. Cambridge University Press (2009)Google Scholar
- 7.Dziembowski, S., Zdanowicz, M.: Position-Based Cryptography from Noisy Channels. In: ePrint archive (2014)Google Scholar
- 8.Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Secret key extraction from level crossings over unauthenticated wireless channels. In: Liu, R., Trappe, W. (eds.) Securing Wireless Communications at the Physical Layer, pp. 201–230. Springer, US (2010)Google Scholar
- 9.Maurer, U.: Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology 5(1) (1992)Google Scholar
- 10.Maurer, U.: Secret key agreement by public discussion from common information. IEEE Transcations on Information Theory 39 (May 1993)Google Scholar
- 11.Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of the 2nd ACM workshop on Wireless security, pp. 1–10. ACM (2003)Google Scholar
- 12.Singelee, D., Preneel, B.: Location verification using secure distance bounding protocols. In: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, p. 7. IEEE (2005)Google Scholar