2009 First International Communication Systems and Networks and Workshops 2009
DOI: 10.1109/comsnets.2009.4808858
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of the Louis protocol for location privacy

Abstract: Abstract-Many location-based services for alerting persons of nearby friends have been deployed in practice. A drawback of most approaches to providing such services is that friends always learn each other's location even when they are not actually nearby. The Louis protocol proposed by Zhong, Goldberg and Hengartner aims to ensure that a friend's location is revealed to another friend if and only if the friends are actually nearby. The protocol lets a third party learn whether the friends are nearby, without … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2009
2009
2012
2012

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…Reference [20] tells us how to determine the meeting points of two intersected circles. Meanwhile, reference [21] gives a method to share unified location with end user privacy control and reference [22] gives a security analysis of the Louis protocol for location privacy. All the research are balancing the privacy and efficiency, a method without any leaking is not really existed, but more efficient ways for limit disclosure of information are more useful and practical.…”
Section: A Secure Multi-party Computationmentioning
confidence: 99%
“…Reference [20] tells us how to determine the meeting points of two intersected circles. Meanwhile, reference [21] gives a method to share unified location with end user privacy control and reference [22] gives a security analysis of the Louis protocol for location privacy. All the research are balancing the privacy and efficiency, a method without any leaking is not really existed, but more efficient ways for limit disclosure of information are more useful and practical.…”
Section: A Secure Multi-party Computationmentioning
confidence: 99%