2018
DOI: 10.1007/978-3-030-01446-9_2
|View full text |Cite
|
Sign up to set email alerts
|

Location-Proof System Based on Secure Multi-party Computations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(12 citation statements)
references
References 17 publications
0
12
0
Order By: Relevance
“…The user obtains a location certificate from a number of location beacons, as in FOAM, and generates a zero-knowledge proof of its with the help of the beacons. Dupin et al [11] proposed another privacy-preserving scheme using group signatures for identity privacy, combining with secure multi-party computation for location privacy. It achieves strong privacy guarantees, but suffers high performance overhead due to the expensive cryptographic primitives.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The user obtains a location certificate from a number of location beacons, as in FOAM, and generates a zero-knowledge proof of its with the help of the beacons. Dupin et al [11] proposed another privacy-preserving scheme using group signatures for identity privacy, combining with secure multi-party computation for location privacy. It achieves strong privacy guarantees, but suffers high performance overhead due to the expensive cryptographic primitives.…”
Section: Related Workmentioning
confidence: 99%
“…From Table 3, we can see that only few schemes consider entity privacy. Meanwhile, only [11] and our scheme provide traceability while preserving the entity privacy and location privacy. The PoL scheme by Zhu et al [52] utilizes some kinds of mathematical combination operations to achieve entity and location privacy (without achieving traceability), but the adversary may have nonnegligible advantages in breaking these two security properties.…”
Section: Performance Of Polmentioning
confidence: 99%
See 1 more Smart Citation
“…Proof-of-location (POL) systems [1], [2], [3], [4], [5], [6], [7], [8] offer a compelling solution for providing trustworthy evidence of user location in applications like gaming, supply chain, and workflow compliance. A POL system issues tokens, called proof-of-location or pol, to entities, indicating their presence at a particular geographic location.…”
Section: Introductionmentioning
confidence: 99%
“…To preserve location privacy, cryptographic and non-cryptographic techniques are both used in existing schemes. Cryptographic [4,15,22,41,55,56] techniques include hashing, MACs, symmetric encryption, and digital signatures. Non-cryptographic [47,57] techniques can use the channel's physical layer characteristics to generate signatures.…”
mentioning
confidence: 99%