Advances in Cryptology - CRYPTO 2009 pp 391-407
Position Based Cryptography
We consider what constitutes identities in cryptography. Typical examples include your name and your social-security number, or your fingerprint/iris-scan, or your address, or your (non-revoked) public-key coming from some trusted public-key infrastructure. In many situations, however, where you are defines your identity. For example, we know the role of a bank-teller behind a bullet-proof bank window not because she shows us her credentials but by merely knowing her location. In this paper, we initiate the study of cryptographic protocols where the identity (or other credentials and inputs) of a party are derived from its geographic location.
Secure Positioning; and
Position Based Key Exchange.
We then show that these tasks are in fact universal in this setting – we show how we can use them to realize Secure Multi-Party Computation.Our main contribution in this paper is threefold: to place the problem of secure positioning on a sound theoretical footing; to prove a strong impossibility result that simultaneously shows the insecurity of previous attempts at the problem; and to present positive results by showing that the bounded-storage framework is, in fact, one of the “right” frameworks (there may be others) to study the foundations of position-based cryptography.
- 3.Bussard, L.: Trust Establishment Protocols for Communicating Devices. Ph.D thesis, Eurecom-ENST (2004)Google Scholar
- 5.Capkun, S., Cagalj, M., Srivastava, M.: Secure localization with hidden and mobile base stations. In: IEEE INFOCOM (2006)Google Scholar
- 6.Capkun, S., Hubaux, J.-P.: Secure positioning of wireless devices with application to sensor networks. In: IEEE INFOCOM, pp. 1917–1928 (2005)Google Scholar
- 7.Chandran, N., Goyal, V., Moriarty, R., Ostrovsky, R.: Position based cryptography. Cryptology ePrint Archive (2009), http://eprint.iacr.org/2009/
- 14.Dziembowski, S., Pietrzak, K.: Intrusion-resilient secret sharing. In: FOCS 2007: Proceedings of the 48th Annual IEEE Foundations of Computer Science (2007)Google Scholar
- 20.Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: WiSe 2003: Proceedings of the 2003 ACM workshop on Wireless security, pp. 1–10 (2003)Google Scholar
- 21.Singelee, D., Preneel, B.: Location verification using secure distance bounding protocols. In: IEEE Conference on Mobile Adhoc and Sensor Systems Conference (2005)Google Scholar