Universally composable secure positioning in the bounded retrieval model. (English) Zbl 1497.94131


94A60 Cryptography
Full Text: DOI


[1] Vora A, Nesterenko M. Secure location verification using radio broadcast. IEEE Trans Depend Secur Comput, 2006, 3: 377-385 · doi:10.1109/TDSC.2006.57
[2] Zhang S L, Zhang Q, Liu M Q, et al. A top-down positioning scheme for underwater wireless sensor networks. Sci China Inf Sci, 2014, 57: 032301
[3] Li J Z, Guo F C, Jiang W L. Source localization and calibration using TDOA and FDOA measurements in the presence of sensor location uncertainty. Sci China Inf Sci, 2014, 57: 042315
[4] Gezici S. A survey on wireless position estimation. Wirel Pers Commun, 2008, 44: 263-282 · doi:10.1007/s11277-007-9375-z
[5] Chandran, N.; Goyal, V.; Moriarty, R.; etal., Position based cryptography, 391-407 (2009) · Zbl 1252.94053
[6] Dziembowski, S.; Sapienza, L.; Pietrzak, K., Leakage-resilient cryptography, 293-302 (2008)
[7] Buhrman, H.; Chandran, N.; Fehr, S.; etal., Position based quantum cryptography: impossibility and constructions, 429-446 (2011) · Zbl 1287.94060
[8] Zhang H J, Zhang Z Y, Cao Z F. Position-verification in multi-channel model. Cryptology ePrint Archive, Report 2011/714, http://eprint.iacr.org/2011/714.pdf. 2011
[9] Canetti, R., Universally composable security: a new paradigm for cryptographic protocols, 136-145 (2001)
[10] Canetti, R.; Krawczyk, H., Universally composable notions of key exchange and secure channels, 337-351 (2002) · Zbl 1056.94511
[11] Zhang J W, Ma J F, Moon S J. Universally composable one-time signature and broadcast authentication. Sci China Inf Sci, 2010, 53: 567-580 · doi:10.1007/s11432-010-0056-2
[12] Zhang J W, Ma J F, Moon S J. Universally composable secure TNC model and EAP-TNC protocol in IF-T. Sci China Inf Sci, 2010, 53: 465-482 · Zbl 1497.68030 · doi:10.1007/s11432-010-0059-z
[13] Dziembowski, S., Intrusion-resilience via the bounded-storage model, 207-224 (2006) · Zbl 1112.94010 · doi:10.1007/11681878_11
[14] Dziembowski, S.; Pietrzak, K., Intrusion-resilient secret sharing, 227-237 (2007)
[15] Zhang J W, Ma J F, Yang C. UC model of secure positioning protocols (in Chinese). J Commun, 2013, 34: 117-122
[16] Naor, M.; Yung, M., Universal one-way hash functions and their cryptographic applications, 33-43 (1989)
[17] He, C. H.; Sundararajan, M.; Datta, A.; etal., A modular correctness proof of IEEE 802.11i and TLS, 2-15 (2005) · doi:10.1145/1102120.1102124
[18] Hu, Y.; Jakobsson, M.; Perrig, A., Efficient constructions for one-way hash chains, 423-441 (2005) · Zbl 1126.68399 · doi:10.1007/11496137_29
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.