I Am Alice, I Was in Wonderland: Secure Location Proof Generation and Verification Protocol.
Chitra JavaliGirish RevadigarKasper Bonne RasmussenWen HuSanjay JhaPublished in: LCN (2016)
Keyphrases
- cryptographic protocols
- secure multi party computation
- scalar product
- privacy preserving
- formal proof
- authentication protocol
- covert channel
- homomorphic encryption
- group communication
- security protocols
- security properties
- standard model
- protocol specification
- security analysis
- key agreement protocol
- lightweight
- provably secure
- key distribution
- vertically partitioned data
- secure routing
- formal verification
- formal analysis
- high security
- electronic voting
- key exchange protocol
- blind signature
- dot product
- password authentication
- mobile agent system
- model checker
- theorem prover
- diffie hellman
- user privacy
- rfid systems
- authentication scheme
- single user
- ciphertext
- public key
- security requirements
- security issues
- location information
- integrity verification
- location based services