Position based cryptography
N Chandran, V Goyal, R Moriarty… - Annual International …, 2009 - Springer
We consider what constitutes identities in cryptography. Typical examples include your name
and your social-security number, or your fingerprint/iris-scan, or your address, or your (non-…
and your social-security number, or your fingerprint/iris-scan, or your address, or your (non-…
Position based cryptography with location privacy: A step for fog computing
Fog Computing, which has the advantage of both the Cloud Computing and the Internet of
Things, has changed our daily lives. One important property of the Fog Computing is location …
Things, has changed our daily lives. One important property of the Fog Computing is location …
Position-based cryptography
In this paper, we initiate the theoretical study of cryptographic protocols where the identity, or
other credentials and inputs, of a party are derived from its geographic location. We start by …
other credentials and inputs, of a party are derived from its geographic location. We start by …
[PDF][PDF] Position-based quantum cryptography
… position-based cryptography in the quantum setting. The aim of position-based cryptography
… Position-based cryptography in the classical setting has recently been rigorously studied by …
… Position-based cryptography in the classical setting has recently been rigorously studied by …
Position-based quantum cryptography: Impossibility and constructions
… In this work, we study position-based cryptography in the quantum setting. The aim is to use
the geographical position of a party as its only credential. On the negative side, we show that …
the geographical position of a party as its only credential. On the negative side, we show that …
Geometry of Banach spaces: a new route towards Position Based Cryptography
M Junge, AM Kubicki, C Palazuelos… - … in Mathematical Physics, 2022 - Springer
In this work we initiate the study of position based quantum cryptography (PBQC) from the
perspective of geometric functional analysis and its connections with quantum games. The …
perspective of geometric functional analysis and its connections with quantum games. The …
Simplified instantaneous non-local quantum computation with applications to position-based cryptography
… These results relate to position-based cryptography: an amount of entanglement scaling
exponentially with the number of communicated qubits is sufficient to render any such scheme …
exponentially with the number of communicated qubits is sufficient to render any such scheme …
Position-based cryptography and multiparty communication complexity
… Position based cryptography was partly inspired by the area called secure positioning [8,
12, 33, 37]. More recently there was work towards constructing PBC protocols based on other “…
12, 33, 37]. More recently there was work towards constructing PBC protocols based on other “…
Position-based cryptography from noisy channels
S Dziembowski, M Zdanowicz - … in Africa, Marrakesh, Morocco, May 28-30 …, 2014 - Springer
We study the problem of constructing secure positioning protocols (Sastry et. al, 2003).
Informally, the goal of such protocols is to enable a party P to convince a set of verifiers about P’s …
Informally, the goal of such protocols is to enable a party P to convince a set of verifiers about P’s …
[PDF][PDF] Position Based Cryptography
NCV Goyal, RMR Ostrovsky - academia.edu
We consider what constitutes identities in cryptography. Typical examples include your name
and your social-security number, or your fingerprint/iris-scan, or your address, or your (non-…
and your social-security number, or your fingerprint/iris-scan, or your address, or your (non-…