TY - GEN
T1 - Location-proof system based on secure multi-party computations
AU - Dupin, Aurélien
AU - Robert, Jean Marc
AU - Bidan, Christophe
N1 - Publisher Copyright:
© Springer Nature Switzerland AG 2018.
PY - 2018
Y1 - 2018
N2 - Location-based services are quite popular. Their variety and their numerous users show it clearly. However, these applications rely on the persons’ honesty to use their real location. If they are motivated to lie about their position, they can do so. A location-proof system allows a prover to obtain proofs from nearby witnesses, for being at a given location at a given time. Such a proof can be used to convince a verifier later on. Many solutions have been designed in the last decade, but none protects perfectly the privacy of their participants. Indeed, provers and witnesses may want to keep their identity and location private. In this paper, a solution is presented in which a malicious adversary, acting as a prover, cannot cheat on his position. It relies on multi-party computations and group-signature schemes to protect the private information of both the prover and the witnesses against any semi-honest participant. Additionally, this paper gives a new secure multi-party maximum computation protocol requiring O(n log(n)) computations and communications, which greatly improves the previously known solutions having O(n2) complexities. Although it is designed for our location-proof system, it can be applied to any scenario in which a small information leakage is acceptable.
AB - Location-based services are quite popular. Their variety and their numerous users show it clearly. However, these applications rely on the persons’ honesty to use their real location. If they are motivated to lie about their position, they can do so. A location-proof system allows a prover to obtain proofs from nearby witnesses, for being at a given location at a given time. Such a proof can be used to convince a verifier later on. Many solutions have been designed in the last decade, but none protects perfectly the privacy of their participants. Indeed, provers and witnesses may want to keep their identity and location private. In this paper, a solution is presented in which a malicious adversary, acting as a prover, cannot cheat on his position. It relies on multi-party computations and group-signature schemes to protect the private information of both the prover and the witnesses against any semi-honest participant. Additionally, this paper gives a new secure multi-party maximum computation protocol requiring O(n log(n)) computations and communications, which greatly improves the previously known solutions having O(n2) complexities. Although it is designed for our location-proof system, it can be applied to any scenario in which a small information leakage is acceptable.
KW - Location proof
KW - Privacy preserving
KW - Secure multi-party maximum computation
KW - Secure two-party comparison computation
UR - https://www.scopus.com/pages/publications/85055702595
U2 - 10.1007/978-3-030-01446-9_2
DO - 10.1007/978-3-030-01446-9_2
M3 - Contribution to conference proceedings
AN - SCOPUS:85055702595
SN - 9783030014452
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 22
EP - 39
BT - Provable Security - 12th International Conference, ProvSec 2018, Proceedings
A2 - Baek, Joonsang
A2 - Susilo, Willy
A2 - Kim, Jongkil
PB - Springer Verlag
T2 - 12th International Conference on Provable Security, ProvSec 2018
Y2 - 25 October 2018 through 28 October 2018
ER -