2014
DOI: 10.1137/100805005
|View full text |Cite
|
Sign up to set email alerts
|

Position-Based Cryptography

Abstract: We consider what constitutes identities in cryptography. Typical examples include your name and your social-security number, or your fingerprint/iris-scan, or your address, or your (non-revoked) publickey coming from some trusted public-key infrastructure. In many situations, however, where you are defines your identity. For example, we know the role of a bank-teller behind a bullet-proof bank window not because she shows us her credentials but by merely knowing her location. In this paper, we initiate the stu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
32
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(32 citation statements)
references
References 39 publications
0
32
0
Order By: Relevance
“…The concept of three verifiers was introduced by Capkun & Hubaux (2005), Shmatikov & Wang (2007), Singelee & Preneel (2005). Collision attacks were studied by Chandran et al (2014), Chiang, Haas & Hu (2009).…”
Section: Distance Bounding Protocols In Literaturementioning
confidence: 99%
“…The concept of three verifiers was introduced by Capkun & Hubaux (2005), Shmatikov & Wang (2007), Singelee & Preneel (2005). Collision attacks were studied by Chandran et al (2014), Chiang, Haas & Hu (2009).…”
Section: Distance Bounding Protocols In Literaturementioning
confidence: 99%
“…The standard way to identify participants in cryptographic protocols is to check their knowledge of some secret data (like a password or a key), to verify some biometric information, or the possession of some hardware tokens. A new intriguing idea, known under the name of position-based cryptography (PBC) [16] is to construct algorithms in which the participating parties are identified by their geographic position. For example, consider the setting where we want to grant access to a server only to the personnel within some military base.…”
Section: Introductionmentioning
confidence: 99%
“…Of course, such protocols can be combined with other means of authentication, and hence they can also serve for providing an additional layer of security. See [16] for more on potential applications of this concept.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations