吉林大学学报(工学版) ›› 2012, Vol. 42 ›› Issue (增刊1): 300-303.

Previous Articles     Next Articles

Position-based authentication

LUO Wen-jun, GAO Yi-feng   

  1. College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
  • Received:2012-05-01 Online:2012-09-01 Published:2012-09-01

Abstract: A new position-based authentication solution was proposed by using geographic features as a unique identity. The new scheme improved the disadvantage of the previous scheme that it must be very accurate in measuring time response. It designed mainly according the characteristic of the limited-storage of the BSM model and the information that received at the same time can be commulated but cannot be stored, so it has no special requirements for the time response. The new scheme made the position-based authentication methods more diverse and anti-attack means richer, and a protocol of exchange keys based on the position was proposed.

Key words: computer application, position, authentication, time response, BSM model

CLC Number: 

  • TP309
[1] Chandran N, Goyal N, Moriarty R, et al. Position Based Cryptography[C]//Advances in Cryptology- CRYPTO 2009: 29th Annual International Cryptology Conference. Santa Barbara: Springer, 2009.

[2] Naor M, Segev G. Public-key: cryptosystems resilient to key leakage[C]//Advances in Cryptology -CRYPTO 2009: 29th Annual International Cryptology Conference. Santa Barbara: Springer, 2009.

[3] Pass R, Wei L, Tseng D, et al. On the composition of public-coin zero-knowledge protocols[C]//Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology Conference. Santa Barbara: Springer, 2009.

[4] Icart T. How to hash into elliptic curves[C]//Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology Conference. Santa Barbara: Springer, 2009.

[5] Waters B. Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions[C]//Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology Conference. Santa Barbara: Springer, 2009.

[6] Biryukov A, Khovratovich D, Nikoli I. Distinguisher and related-key attack on the full AES-256[C]//Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology Conference. Santa Barbara: Springer, 2009.

[7] Chandran N, Goyal V, Moriarty R, et al. Position based cryptography.. http:[C]//eprint.iacr.org/2009/
[1] LIU Yu-mei,LIU Li,CAO Xiao-ning,XIONG Ming-ye,ZHUANG Jiao-jiao. Construction on collision avoidance model of bogie dynamic simulation test bench [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1661-1668.
[2] LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850.
[3] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[4] JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866.
[5] ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872.
[6] LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878.
[7] WANG Yan, GAO Qing, WANG Guo-hua, ZHANG Tian-shi, YUAN Meng. Simulation of mixed inner air-flow integrated thermal management with temperature uniformity of Li-ion battery [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1339-1348.
[8] OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570.
[9] YU Yi-cheng, HU Liang, CHI Ling, CHU Jian-feng. Improved anonymous authentication protocol for multi-server architectures [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1586-1592.
[10] LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599.
[11] GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605.
[12] LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613.
[13] CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628.
[14] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[15] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!