A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Position Based Cryptography
[chapter]
2009
Lecture Notes in Computer Science
of position-based cryptography. ...
; and -Position Based Key Exchange. ...
Open Problem: Other Models for Position Based Cryptography. ...
doi:10.1007/978-3-642-03356-8_23
fatcat:lgl7ophqlfdblbbel2bqwk7vce
Position-Based Cryptography
2014
SIAM journal on computing (Print)
of position-based cryptography. ...
; and -Position Based Key Exchange. ...
Open Problem: Other Models for Position Based Cryptography. ...
doi:10.1137/100805005
fatcat:cecd652o7nejdmrm2tkk4mqbsu
Position-Based Quantum Cryptography
[article]
2010
arXiv
pre-print
A central task in position-based cryptography is the problem of secure positioning. ...
The goal of position-based cryptography is to use the geographical position of a party as its only "credential". ...
Then in order to authenticate a position i in which m ′ i = m i , the adversary must call P at least N/8 times with positions that are not in ci , i.e., at least N/8 bits of cj , j = i, otherwise his success ...
arXiv:1005.1750v2
fatcat:mkvedihmafchfhielnavubneli
Asymmetric Position-Based Quantum Cryptography
[article]
2014
arXiv
pre-print
In this paper, we give a formulism to prove information-theoretic position-based quantum cryptography is possible in asymmetric quantum setting. ...
All existing protocols in this field are based on symmetric cryptography where verifiers and the prover use the same secret key. ...
Recently, different authors [6] [7] [8] [9] [10] [11] [12] [13] [14] claimed same information-theoretic security in position-based quantum cryptography (PBQC); identification and position verification ...
arXiv:1403.7188v1
fatcat:ocdnrun7hjdnjmmjledgkofiui
Practical position-based quantum cryptography
2015
Physical Review A. Atomic, Molecular, and Optical Physics
We study a general family of quantum protocols for position verification and present a new class of attacks based on the Clifford hierarchy. ...
These attacks outperform current strategies based on port-based teleportation for a large class of practical protocols. ...
Acknowledgments We thank André Chailloux, Frédéric Grosshans and Christian Schaffner for many stimulating discussions on position-based cryptography. ...
doi:10.1103/physreva.92.052304
fatcat:qahz3frchjbx7jqhzl53gpvdli
Position-based quantum cryptography over untrusted networks
2014
Laser physics
However, our proposed formulism for quantum position-verification is more robust, secure and according to the standard assumptions of cryptography. ...
Most of these schemes are based on non-cryptographic assumptions, that is, quantum/classical channels between the verifiers are secure. ...
Introduction The central task of position-based cryptography is position-verification. ...
doi:10.1088/1054-660x/24/8/085202
fatcat:yrrxyi2z6nbl7grnaqbpqslab4
Unconditionally secure commitment in position-based quantum cryptography
2014
Scientific Reports
A new commitment scheme based on position-verification and non-local quantum correlations is presented here for the first time in literature. ...
The position-based commitment scheme bounds committer to reveal valid commitment within allocated time and guarantees that the receiver will not be able to get information about commitment unless committer ...
Position-based quantum cryptography [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] has remained a conundrum for many years, but recently we proposed a quantum scheme for secure positioning ...
doi:10.1038/srep06774
pmid:25346509
pmcid:PMC4209449
fatcat:y4ruca4xrre6xam55blg7lxcii
Loss-tolerant position-based quantum cryptography
2015
Physical Review A. Atomic, Molecular, and Optical Physics
Position-based quantum cryptography (PBQC) allows a party to use its geographical location as its only credential to implement various cryptographic protocols. ...
POSITION-BASED QUANTUM CRYPTOGRAPHY For simplicity, in this paper, we only consider the onedimensional case with two verifiers, V 0 and V 1 , and a prover P in the middle. ...
Appendix: Finite number of bases The PBQC with finite bases is summarized below: 1. ...
doi:10.1103/physreva.91.042337
fatcat:thcuved24vaj3eptxfnxihmqca
Secure-Positioning-Protocol-Based Symmetric Cryptography
2017
DEStech Transactions on Computer Science and Engineering
Position-based cryptography has attracted lots of researchers' attention. In the mobile Internet, there are lots of position-based security applications. ...
For the first time, one new conception, positioning-protocol-based symmetric cryptography is proposed. Based on one secure positioning protocol, one symmetric model is proposed. ...
The model is depicted in Fig. 1
Definition-Positioning-protocol-based Symmetric Cryptography Simply speaking, the cryptography combines traditional symmetric cryptography and positioning protocols ...
doi:10.12783/dtcse/cmsam2017/16390
fatcat:xbbahmjwfvgszgwmr5syar2rwu
Position-Based Quantum Cryptography: Impossibility and Constructions
2014
SIAM journal on computing (Print)
In this work, we study position-based cryptography in the quantum setting. The aim is to use the geographical position of a party as its only credential. ...
and position-based key agreement. ...
A central task in position-based cryptography is the problem of position-verification. ...
doi:10.1137/130913687
fatcat:vwosriwhfbejvjp55epb6xljvy
Position-Based Cryptography and Multiparty Communication Complexity
[chapter]
2017
Lecture Notes in Computer Science
Position based cryptography (PBC), proposed in the seminal work of Chandran, Goyal, Moriarty, and Ostrovsky (SIAM J. ...
Chandran et al. construct PBC schemes for secure positioning and position-based key agreement in the bounded-storage model (Maurer, J. Cryptology, 1992). ...
Position based cryptography was partly inspired an the area called secure positioning [7, 33, 37, 11] . ...
doi:10.1007/978-3-319-70500-2_3
fatcat:wj6pm5zah5chrcrcicdgx4w6fm
Position-Based Quantum Cryptography: Impossibility and Constructions
[chapter]
2011
Lecture Notes in Computer Science
In this work, we study position-based cryptography in the quantum setting. The aim is to use the geographical position of a party as its only credential. ...
More generally, we show that in settings where secure position-verification is achievable, other position-based cryptographic schemes are possible as well, such as secure position-based authentication ...
A central task in position-based cryptography is the problem of position-verification. ...
doi:10.1007/978-3-642-22792-9_24
fatcat:i2ruygfoazf5dogccyogi3edgq
Geometry of Banach spaces: a new route towards Position Based Cryptography
[article]
2022
arXiv
pre-print
In this work we initiate the study of Position Based Quantum Cryptography (PBQC) from the perspective of geometric functional analysis and its connections with quantum games. ...
In order to deepen the understanding of this question, here we propose a Position Verification (PV) protocol and find lower bounds on the resources needed to break it. ...
Introduction In the field of Position Based Cryptography (PBC) one aims to develop cryptographic tasks using the geographical position of a third party as its only credential. ...
arXiv:2103.16357v3
fatcat:y4auiwyspnabvgnz5n5qitgjdm
Position-Based Quantum Cryptography and the Garden-Hose Game
[article]
2012
arXiv
pre-print
This model furthermore opens up a way to link the security of position-based quantum cryptography to traditional complexity theory. ...
We study position-based cryptography in the quantum setting. We examine a class of protocols that only require the communication of a single qubit and 2n bits of classical information. ...
Position-based quantum cryptography The goal of position-based cryptography is to perform cryptographic tasks using location as a credential. ...
arXiv:1210.4353v1
fatcat:j6fxej6vdnaxpkwrtkjprc7wjy
Simplified instantaneous non-local quantum computation with applications to position-based cryptography
2011
New Journal of Physics
These results relate to position-based cryptography: an amount of entanglement scaling exponentially in the number of communicated qubits is sufficient to render any such scheme insecure. ...
Implications for position-based quantum cryptography Position-based cryptography revolves around the idea of using the geographical location of an entity as its only credential. ...
Position-based quantum cryptography attempts to overcome this impossibility using quantum cryptographic techniques. ...
doi:10.1088/1367-2630/13/9/093036
fatcat:vvbyxwcxwbey7fpkh3yaiexmgy
« Previous
Showing results 1 — 15 out of 55,129 results