期刊文献+

安全定位协议的UC模型 被引量:2

UC model of secure positioning protocols
下载PDF
导出
摘要 研究了基于位置密码学中安全定位协议的可证明安全问题。在通用可组合安全框架下,提出了安全定位的可证安全模型。根据安全定位协议的需求,设计了安全定位的理想函数。同时,作为基于位置密码学的一种前提假设,设计了BRM模型的理想函数。此外,以1-维空间的安全定位协议为例,证明了该协议在BRM模型下能够实现安全定位的理想函数。 The provable security of secure positioning in position-based cryptography was investigated, and the provable secure model of secure positioning was established in the universally composable framework. According to the security requirements of secure positioning, the ideal functionality of secure positioning firstly was proposed. Then, the ideal functionality of bounded retrieval model was designed as one of the set-up assumptions in position-based" cryptography. Lastly, the secure positioning protocol in 1-dimension space, as an example, could securely realize the functionality of secure positioning in the bounded retrieval model.
出处 《通信学报》 EI CSCD 北大核心 2013年第2期117-122,共6页 Journal on Communications
基金 国家科技重大专项基金资助项目(2011ZX03005-002) 国家自然科学基金资助项目(U1135002 61100230 61100233) 陕西省自然科学基础研究计划基金资助项目(2011JQ8003) 中央高校基本科研业务费基金资助项目~~
关键词 基于位置密码学 安全定位 UC安全 position-based cryptography secure positioning UC secure
  • 相关文献

参考文献3

二级参考文献26

  • 1ZHANG Fan,MA JianFeng,SangJae MOON.Universally composable anonymous Hash certification model[J].Science in China(Series F),2007,50(3):440-455. 被引量:9
  • 2李凤华,冯涛,马建峰.基于VSPH的UC不经意传输协议[J].通信学报,2007,28(7):28-34. 被引量:8
  • 3CANETH R.Universally composable security:a new paradigm for cryptographic protocols[EB/OL].http://eprint.iacr.org/2000/067.
  • 4LAMPORT L.Constructing Digital Signatures From a One-Way Function[R].Technical Report SRI-CSL-98.SRI International Com-puter Science Laboratory,1979.
  • 5PERRIG A.The BiBa one-time signature and broadcast authentication protocol[A].ACM Conference on Computer and Communications Security[C].2001.28-37.
  • 6MITZENMACHER M,PERRIG A.Bounds and Improvements for BiBa Signature Schemes[R].No.TR-02-02,Computer Science Group,Harvard University,USA,2002.
  • 7REYZIN L.REYZIN N.Better than BiBa:short one-time signatures with fast signing and verifying[A].Information Security and Privacy,7th Australian Conference,ACISP 2002[C].2002.144-153.
  • 8PlEPRZYK J,WANG H X,XING C P.Multiple-time signature schemes against adaptive chosen message attacks[A].Selected Areas in Cryptography,SAC 2003[C].2003.88-100.
  • 9PARK Y,CHO Y.Efficient one-time signature schemes for stream authentication[J].Journal of Information Science and Engineering 22,2006.611-624.
  • 10LUK M,PERRIG A,WHIIJOCK B.Seven cardinal properties of sensor network broadcast authentication[A].ACM Workshop on Se-curity of Ad Hoc and Sensor Networks,(SASN'06)[C].2006.

共引文献16

同被引文献29

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2李凤华,冯涛,马建峰.基于VSPH的UC不经意传输协议[J].通信学报,2007,28(7):28-34. 被引量:8
  • 3LIM C H, KWON T. Strong and robust RFID authentication enabling perfect ownership transfer[A]. 8th International Conference on Infor- marion and Communications Security[C]. Raleigh, NC, USA, 2006. 1-20.
  • 4MOLNAR D, SOPPERA A, WAGNER D. A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags[A]. 12th International Workshop on Selected Areas in Cryptography[C]. Kingston, Ont, Canada, 2006. 276-290.
  • 5OSAKA K, TAKAGI T, YAMAZAKI K, et al. An efficient and secure RFID security method with ownership transfer[A]. Proceedings of IEEE 2006 International Conference on Computational Intelligence and Security[C]. Guangzhou, China, 2006. 1090-1095.
  • 6FOULADGAR S, AFIFI H. An efficient delegation and transfer of ownership protocol for RFID tags[A]. Proceedings of the 1st Interna- tional EURASIP Workshop on RFID Technology[C]. Vienna, Austria, 2007.68-93.
  • 7SONG B. RFID tag ownership iaik. transfer[EB/OL], http://rfidsec2013 2008.
  • 8RIZOMILIOTIS P, REKLEITIS E. Security analysis of the Song- Mitchell authentication protocol for low-cost RFID tags[J]. IEEE Communications Letters, 2009, 13(4):274-276.
  • 9PERIS-LOPEZ P, HEMANDEZ-CASTRO J C, TAPIADOR J M E, et al. Vulnerability analysis of RFID protocols for tag ownership transfer[J]. Computer Networks, 2010, 54(9): 1502-1508.
  • 10SONG B, MITCHELL C J. Scalable RFID secttdty protocols support- ing tag ownership transfer[J]. Computer Communications, 2011, 34(4) 556-566.

引证文献2

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部