Filters








55,129 Hits in 2.4 sec

Position Based Cryptography [chapter]

Nishanth Chandran, Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky
2009 Lecture Notes in Computer Science  
of position-based cryptography.  ...  ; and -Position Based Key Exchange.  ...  Open Problem: Other Models for Position Based Cryptography.  ... 
doi:10.1007/978-3-642-03356-8_23 fatcat:lgl7ophqlfdblbbel2bqwk7vce

Position-Based Cryptography

Nishanth Chandran, Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky
2014 SIAM journal on computing (Print)  
of position-based cryptography.  ...  ; and -Position Based Key Exchange.  ...  Open Problem: Other Models for Position Based Cryptography.  ... 
doi:10.1137/100805005 fatcat:cecd652o7nejdmrm2tkk4mqbsu

Position-Based Quantum Cryptography [article]

Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky
2010 arXiv   pre-print
A central task in position-based cryptography is the problem of secure positioning.  ...  The goal of position-based cryptography is to use the geographical position of a party as its only "credential".  ...  Then in order to authenticate a position i in which m ′ i = m i , the adversary must call P at least N/8 times with positions that are not in ci , i.e., at least N/8 bits of cj , j = i, otherwise his success  ... 
arXiv:1005.1750v2 fatcat:mkvedihmafchfhielnavubneli

Asymmetric Position-Based Quantum Cryptography [article]

Muhammad Nadeem
2014 arXiv   pre-print
In this paper, we give a formulism to prove information-theoretic position-based quantum cryptography is possible in asymmetric quantum setting.  ...  All existing protocols in this field are based on symmetric cryptography where verifiers and the prover use the same secret key.  ...  Recently, different authors [6] [7] [8] [9] [10] [11] [12] [13] [14] claimed same information-theoretic security in position-based quantum cryptography (PBQC); identification and position verification  ... 
arXiv:1403.7188v1 fatcat:ocdnrun7hjdnjmmjledgkofiui

Practical position-based quantum cryptography

Kaushik Chakraborty, Anthony Leverrier
2015 Physical Review A. Atomic, Molecular, and Optical Physics  
We study a general family of quantum protocols for position verification and present a new class of attacks based on the Clifford hierarchy.  ...  These attacks outperform current strategies based on port-based teleportation for a large class of practical protocols.  ...  Acknowledgments We thank André Chailloux, Frédéric Grosshans and Christian Schaffner for many stimulating discussions on position-based cryptography.  ... 
doi:10.1103/physreva.92.052304 fatcat:qahz3frchjbx7jqhzl53gpvdli

Position-based quantum cryptography over untrusted networks

Muhammad Nadeem
2014 Laser physics  
However, our proposed formulism for quantum position-verification is more robust, secure and according to the standard assumptions of cryptography.  ...  Most of these schemes are based on non-cryptographic assumptions, that is, quantum/classical channels between the verifiers are secure.  ...  Introduction The central task of position-based cryptography is position-verification.  ... 
doi:10.1088/1054-660x/24/8/085202 fatcat:yrrxyi2z6nbl7grnaqbpqslab4

Unconditionally secure commitment in position-based quantum cryptography

Muhammad Nadeem
2014 Scientific Reports  
A new commitment scheme based on position-verification and non-local quantum correlations is presented here for the first time in literature.  ...  The position-based commitment scheme bounds committer to reveal valid commitment within allocated time and guarantees that the receiver will not be able to get information about commitment unless committer  ...  Position-based quantum cryptography [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] has remained a conundrum for many years, but recently we proposed a quantum scheme for secure positioning  ... 
doi:10.1038/srep06774 pmid:25346509 pmcid:PMC4209449 fatcat:y4ruca4xrre6xam55blg7lxcii

Loss-tolerant position-based quantum cryptography

Bing Qi, George Siopsis
2015 Physical Review A. Atomic, Molecular, and Optical Physics  
Position-based quantum cryptography (PBQC) allows a party to use its geographical location as its only credential to implement various cryptographic protocols.  ...  POSITION-BASED QUANTUM CRYPTOGRAPHY For simplicity, in this paper, we only consider the onedimensional case with two verifiers, V 0 and V 1 , and a prover P in the middle.  ...  Appendix: Finite number of bases The PBQC with finite bases is summarized below: 1.  ... 
doi:10.1103/physreva.91.042337 fatcat:thcuved24vaj3eptxfnxihmqca

Secure-Positioning-Protocol-Based Symmetric Cryptography

Qing-shui XUE, Feng-ying LI, Xiang-wei ZHENG, Ming-lei SHU, Yun-xiang LIU, Zhi-yong SHAN, Wen-ju LI
2017 DEStech Transactions on Computer Science and Engineering  
Position-based cryptography has attracted lots of researchers' attention. In the mobile Internet, there are lots of position-based security applications.  ...  For the first time, one new conception, positioning-protocol-based symmetric cryptography is proposed. Based on one secure positioning protocol, one symmetric model is proposed.  ...  The model is depicted in Fig. 1 Definition-Positioning-protocol-based Symmetric Cryptography Simply speaking, the cryptography combines traditional symmetric cryptography and positioning protocols  ... 
doi:10.12783/dtcse/cmsam2017/16390 fatcat:xbbahmjwfvgszgwmr5syar2rwu

Position-Based Quantum Cryptography: Impossibility and Constructions

Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner
2014 SIAM journal on computing (Print)  
In this work, we study position-based cryptography in the quantum setting. The aim is to use the geographical position of a party as its only credential.  ...  and position-based key agreement.  ...  A central task in position-based cryptography is the problem of position-verification.  ... 
doi:10.1137/130913687 fatcat:vwosriwhfbejvjp55epb6xljvy

Position-Based Cryptography and Multiparty Communication Complexity [chapter]

Joshua Brody, Stefan Dziembowski, Sebastian Faust, Krzysztof Pietrzak
2017 Lecture Notes in Computer Science  
Position based cryptography (PBC), proposed in the seminal work of Chandran, Goyal, Moriarty, and Ostrovsky (SIAM J.  ...  Chandran et al. construct PBC schemes for secure positioning and position-based key agreement in the bounded-storage model (Maurer, J. Cryptology, 1992).  ...  Position based cryptography was partly inspired an the area called secure positioning [7, 33, 37, 11] .  ... 
doi:10.1007/978-3-319-70500-2_3 fatcat:wj6pm5zah5chrcrcicdgx4w6fm

Position-Based Quantum Cryptography: Impossibility and Constructions [chapter]

Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner
2011 Lecture Notes in Computer Science  
In this work, we study position-based cryptography in the quantum setting. The aim is to use the geographical position of a party as its only credential.  ...  More generally, we show that in settings where secure position-verification is achievable, other position-based cryptographic schemes are possible as well, such as secure position-based authentication  ...  A central task in position-based cryptography is the problem of position-verification.  ... 
doi:10.1007/978-3-642-22792-9_24 fatcat:i2ruygfoazf5dogccyogi3edgq

Geometry of Banach spaces: a new route towards Position Based Cryptography [article]

Marius Junge, Aleksander M. Kubicki, Carlos Palazuelos, David Pérez-García
2022 arXiv   pre-print
In this work we initiate the study of Position Based Quantum Cryptography (PBQC) from the perspective of geometric functional analysis and its connections with quantum games.  ...  In order to deepen the understanding of this question, here we propose a Position Verification (PV) protocol and find lower bounds on the resources needed to break it.  ...  Introduction In the field of Position Based Cryptography (PBC) one aims to develop cryptographic tasks using the geographical position of a third party as its only credential.  ... 
arXiv:2103.16357v3 fatcat:y4auiwyspnabvgnz5n5qitgjdm

Position-Based Quantum Cryptography and the Garden-Hose Game [article]

Florian Speelman
2012 arXiv   pre-print
This model furthermore opens up a way to link the security of position-based quantum cryptography to traditional complexity theory.  ...  We study position-based cryptography in the quantum setting. We examine a class of protocols that only require the communication of a single qubit and 2n bits of classical information.  ...  Position-based quantum cryptography The goal of position-based cryptography is to perform cryptographic tasks using location as a credential.  ... 
arXiv:1210.4353v1 fatcat:j6fxej6vdnaxpkwrtkjprc7wjy

Simplified instantaneous non-local quantum computation with applications to position-based cryptography

Salman Beigi, Robert König
2011 New Journal of Physics  
These results relate to position-based cryptography: an amount of entanglement scaling exponentially in the number of communicated qubits is sufficient to render any such scheme insecure.  ...  Implications for position-based quantum cryptography Position-based cryptography revolves around the idea of using the geographical location of an entity as its only credential.  ...  Position-based quantum cryptography attempts to overcome this impossibility using quantum cryptographic techniques.  ... 
doi:10.1088/1367-2630/13/9/093036 fatcat:vvbyxwcxwbey7fpkh3yaiexmgy
« Previous Showing results 1 — 15 out of 55,129 results