Journal on Communications ›› 2013, Vol. 34 ›› Issue (2): 117-122.doi: 10.3969/j.issn.1000-436x.2013.02.014

• engineering report • Previous Articles     Next Articles

UC model of secure positioning protocols

Jun-wei ZHANG,Jian-feng MA,Chao YANG   

  1. School of Computer Science and Technology,Xidian University,Xi’an 710071,China
  • Online:2013-02-25 Published:2017-07-17
  • Supported by:
    The Major National S&T Program;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Natural Science Basic Research Plan in Shaanxi Province of China;The Fundamental Research Funds for the Central Universities

Abstract:

The provable security of secure positioning in position-based cryptography was investigated,and the provable secure model of secure positioning was established in the universally composable framework.According to the security requirements of secure positioning,the ideal functionality of secure positioning firstly was proposed.Then,the ideal functionality of bounded retrieval model was designed one of the set-up assumptions in position-based cryptography.Lastly,the secure positioning protocol in 1-dimension space,as an example,could securely realize the functionality of secure positioning in the bounded retrieval model.

Key words: position-based cryptography, secure positioning, UC secure

No Suggested Reading articles found!