Position based cryptography

N Chandran, V Goyal, R Moriarty… - Annual International …, 2009 - Springer
We consider what constitutes identities in cryptography. Typical examples include your name
and your social-security number, or your fingerprint/iris-scan, or your address, or your (non-…

Position based cryptography with location privacy: A step for fog computing

R Yang, Q Xu, MH Au, Z Yu, H Wang, L Zhou - Future Generation …, 2018 - Elsevier
Fog Computing, which has the advantage of both the Cloud Computing and the Internet of
Things, has changed our daily lives. One important property of the Fog Computing is location …

Position-based cryptography

N Chandran, V Goyal, R Moriarty, R Ostrovsky - SIAM Journal on Computing, 2014 - SIAM
In this paper, we initiate the theoretical study of cryptographic protocols where the identity, or
other credentials and inputs, of a party are derived from its geographic location. We start by …

[PDF][PDF] Position-based quantum cryptography

N Chandran, S Fehr, R Gelles, V Goyal… - arXiv preprint arXiv …, 2010 - Citeseer
position-based cryptography in the quantum setting. The aim of position-based cryptography
Position-based cryptography in the classical setting has recently been rigorously studied by …

Position-based quantum cryptography: Impossibility and constructions

H Buhrman, N Chandran, S Fehr, R Gelles… - SIAM Journal on …, 2014 - SIAM
… In this work, we study position-based cryptography in the quantum setting. The aim is to use
the geographical position of a party as its only credential. On the negative side, we show that …

Geometry of Banach spaces: a new route towards Position Based Cryptography

M Junge, AM Kubicki, C Palazuelos… - … in Mathematical Physics, 2022 - Springer
In this work we initiate the study of position based quantum cryptography (PBQC) from the
perspective of geometric functional analysis and its connections with quantum games. The …

Simplified instantaneous non-local quantum computation with applications to position-based cryptography

S Beigi, R König - New Journal of Physics, 2011 - iopscience.iop.org
… These results relate to position-based cryptography: an amount of entanglement scaling
exponentially with the number of communicated qubits is sufficient to render any such scheme …

Position-based cryptography and multiparty communication complexity

J Brody, S Dziembowski, S Faust, K Pietrzak - Theory of Cryptography …, 2017 - Springer
Position based cryptography was partly inspired by the area called secure positioning [8,
12, 33, 37]. More recently there was work towards constructing PBC protocols based on other “…

Position-based cryptography from noisy channels

S Dziembowski, M Zdanowicz - … in Africa, Marrakesh, Morocco, May 28-30 …, 2014 - Springer
We study the problem of constructing secure positioning protocols (Sastry et. al, 2003).
Informally, the goal of such protocols is to enable a party P to convince a set of verifiers about P’s …

[PDF][PDF] Position Based Cryptography

NCV Goyal, RMR Ostrovsky - academia.edu
We consider what constitutes identities in cryptography. Typical examples include your name
and your social-security number, or your fingerprint/iris-scan, or your address, or your (non-…