通信与信息网络学报 ›› 2016, Vol. 1 ›› Issue (4): 33-43.doi: 10.11959/j.issn.2096-1081.2016.045

• • 上一篇    下一篇

  

  • 修回日期:2016-11-22 出版日期:2016-12-25 发布日期:2019-07-19

Position based key exchange: definitions and implementations

Junwei ZHANG(),Fangqiong DU(),Jianfeng MA(),Chao YANG()   

  1. School of Cyber Engineering, Xidian University, Xi’an 710071, China
  • Revised:2016-11-22 Online:2016-12-25 Published:2019-07-19
  • About author:ZHANG Junwei was born in 1982. He received a Ph. D. degree in computer architecture from Xidian University, where he is now an associate professor. His research interests include cryptography and information security.|DU Fangqiong was born in 1993. She received a B. E. degree from Xidian University. She is now an M. S. candidate in computer architecture at Xidian University. Her research interests include protocol design and analysis.|MA Jianfeng was born in 1963. He received a Ph. D. degree from Xidian University, where he is now a professor. His research interests include network and information security.|YANG Chao was born in 1979. He received a Ph. D. degree in computer architecture from Xidian University, where he is now an associate professor. His research interests include system and information security.
  • Supported by:
    the National High Technology Research and Development Program of China (863 Program)(2015AA016007);the National Natural Science Foundation of China(U1405255);the National Natural Science Foundation of China(61472310);the National Natural Science Foundation of China(61372075)

Abstract:

Chandran, et al. introduce the direction of position based cryptography at CRYPTO 2009. In position based cryptography, the position of a party is used to be its unique “credential” in order to realize the cryptographic tasks, such as position based encryption, position based signature, position based key exchange and so on. Position based key exchange, as a basic primitive in position based cryptography, can be used to establish a shared key based on the position of the participant. To begin with, this paper presents the notions of the prover-to-verifier mode and the prover-to-prover mode for position based key exchange. In the prover-to-verifier mode, a secret key can be shared between a prover and the verifiers according to the position of the prover. While in the prover-to-prover mode, two provers located at the valid positions can negotiate a shared key with the help of the verifiers and any other party whose position is illegal cannot obtain the shared key. At the same time, this paper formalizes two security definitions against colluding adversaries: position based prover-to-verifier key exchange and position based prover-to-prover key exchange. Then, this paper introduces the bounded retrieval model and the implementations of position based key exchange in two modes based on the bounded retrieval model. Finally, this paper discusses the position based key exchange protocols in two modes from both security and performance perspectives.

Key words: position based key exchange, position based cryptography, prover-to-verifier, prover-to-prover, bounded retrieval model

[1] 刘伯涛. 移动回传的融合之路[J]. 电信科学, 2009, 25(11): 91 -93 .
[2] 鲜永菊,董灿,张祖凡,吴东伟. LTE-A载波聚合下的载波切换分析[J]. 电信科学, 2009, 25(12): 46 -50 .
[3] 桑俊俊,石胜飞,李建中,熊蜀光. 无线传感器网络分布式单向链路检测算法[J]. 通信学报, 2008, 29(11): 22 -172 .
[4] 曾 益,胡 波,冯 辉. 用于传感器网络的高效分时洪泛时钟同步协议[J]. 通信学报, 2007, 28(5): 2 -14 .
[5] 王俊波,陈 明. 单业务TDD-CDMA系统上行用户容量分析[J]. 通信学报, 2007, 28(6): 8 -53 .
[6] 张 静,胡华平,刘 波,肖枫涛. 基于ASPQ的LDoS攻击检测方法[J]. 通信学报, 2012, 33(5): 10 -84 .
[7] 牛德华,马建峰,马卓,李辰楠,王蕾. 基于属性的安全增强云存储访问控制方案[J]. 通信学报, 2013, 34(Z1): 37 -284 .
[8] 欧智慧,赵亚群. 一类对称布尔函数的研究[J]. 通信学报, 2013, 34(1): 10 -95 .
[9] 刘 龙,宋琦军,赵太飞,元向辉. 基于运动矢量时-空特性的快速运动估计算法研究[J]. 通信学报, 2013, 34(1): 14 -127 .
[10] 王亚石,闵丽娟,周严. OSS/BSS一体化及其与ITSM的融合[J]. 电信科学, 2014, 30(6): 17 -23 .