Vous êtes sur la page 1sur 8

)$* , -

+ ', - $ %

# $ % 3045 6 $ (

0% , R (
6 #
3 6[

7 ' #X 7

* Z %#21

2 #

" Z 1<

, #I

8 " ZM > ?!

6E Z 1<

E-mail: maedeh792002@yahoo.com, ahmadb@eng.ui.ac.ir, naserm@eng.ui.ac.ir


)$*

+ ',- $ %

,- $ %
, $ 05

./0

./0

, -0 &$' ( 05

./0 , :;
./0

( "

./0

, -0

% "
)$*

+ '=

)$* , + '

, -0
+ ' $+

HA
(

9O "

3045 6 $ 7

&$' (
@ 0
2 0

05

>$?

C; * # "B

G0 $ D AHI
2

"0 $ % %
# $ % </

D EA

0 $ %! %

+ '
6

./0

&$' ( # $ % "0+

,0 &$' F )$*
F # 09A

, -0 &$' ( # $ % ! "

./0

./0

% " "
#$ %

2 9%

%,

$E . $ % F

2 "

@ $%

)$*

+ '
+ '

$ %
(
>$?

0 " # #> I D J E K, & G) : 3 6 L


: )
! "" 8 9
#
# B 0 3 + A%
! " " 8 9 " (> 3 M$ > I D 0
4[3] % #
4[4] % 6 L ( ()D
! > N 9 ( OD : )
Q ) R)
! 6L
!P6
" !>N9 /
" 6 L ( ()D
! " " 4#2 " *
3 <)
"" & S
4 " #2! E 3 <) " G R )
!
4 " #! E < )
"G R)
!
" + 6$
N 9 /62T % E " # 3
= / 2
/62T " 4#2
"
6 L ( ()D Q )
!>
(V6) 3 #2 U
"E 6L
% T
"
"" =
6L
4#2
" W6
4[4] # X < " " / #2
0
6D
%
Y #2 )
( 8T (
% / ( OD / 2

+ '@

"

99%

./0

./0

(0J $ %
KA
2 "

# $ % 3045 6 $ @)$* , -

)$*

3045 6 $ =
0 &$'

0I

8 -2 -

/ $ L MN
+"

@ 0% , R

N P"
Q

S
&' # $ "
%
!"
"
4# () " ! *' + ,-. / 0 # ( %
!
" 62
5#! ! " " / 0

123
4[1,2] %

4#
: ) ! "" 8 9 7
!"
0
( 7" # " > ?
" " 8 9 = ; 1< / "
"" 8 9 0 @ ! ( A
"" 8 9 )
4[2] % # B 0 3 : )
C ! ?6
+ ,-.
0 + A, )D6% /
!# #13
FG 7 ! " " 6 > FG 7
E
# #13
4[2] % % " " <)%
!"H % "

( 4#22 "
6L ( ()D
! > N 9 7;
]< 1 '
E
( & /6, " 8 " + A,
4# #2 1 ! > N 9 ( 82
? 0 #2 ) 7"
0 " <)% : )
! "" 8 9 " " >
!U
= P% 3 /
!& 0 " <)%
)D
%
U / 0 = ! $ 4[4] % " X), " ; % @
0 +# ^ . " <)% 4[5] #2)D! 3"" E !
- 4"
!
K,
)D % =
=
!P6 " " X), " ; % @ = " V
_ % # #> U
X% (
ID / 4 %
7N % /6X! 4# +/ 0
, ( #!"
`<
1>
! (I J6G 3 / 5#!
()D
! > N 9 0 " <)% ; 82! "
E
4 % 6L (

A) "
123 + ,-. / c X)> #
6El
6
E /) P
/ " 4 % % )%"
L
!U ( n 6) (
%
#6m69 (% 9 6 L
2)A 8 " U =
D26 $ 4" " @ " R
8 9 ( % )%" ; 82! " P% ? ; = 0 " <)%
& oD ? ; / 4[2] % " (I
! ""
4 % "" 8 9
/6 / e A3 =
L
" " 6%
+ ,-. @!
'+6
E
/ " 4" 6*
7[7,8] (paws)
) 6 "
E
4"

!( A " 6 L 0 ` <
!U
q\ ! % 6% q p[6] # " L ()%"
" " L 6 23
& ()%" " 4 #
L K " " " L #G, 8 8T
8
# ! )D6% (
3 (26 0
E
` < /6 3
T T
! % 6% 7[6] ! 6A 3 X
[10] % )%" & )2 ;?6
[9]

PA3
!
#) \ @ " ( " "
( A " 6L 0
E
8 ? U a @ " 4 " 6! E 6%
!
b Y 6 L 0 `< c d
' e A3
f
(I
" 12 69 3 9
g @ 4"
U / +6
E
69 K
h @ " 4#!"
#2 BX> i @ "
1 "
6!" ( "
4 6!"
9 K 7M$ Y

()%" / r?> !U
S ( !
; " ()%"
"" E ;0^ 6s + ,-.
0 # " % 7#2)D!
$ )2 2Xd W
Y 8 " + A, ( 4#22
""
0 (T "
D (T ( 7 3 ,-. (T ( 2
+
j % % + ,-. / 4#2!" ; V 7"
) 8$ q p0 #23 A, 1
/ 4#2)D!
3 9 = U / p[11] (ANDOR)N 2
6D
() " 8 < # G
! ' "( %
6D
/ p[12] 1 69 M63 3 /)
! ( U q\ 4"
'BX> R )
*#2)% 0 R )
!; 69 U
= N%
1 ' H[% 4"0 #
6E 3 1 ' /6 "
qa 4#)%
8 " !"
*#2)% ( e
M63 3
=62 3 / " p [13] (Mix Zone) e
=62 3
1 ' /6 H[% 7 # AC
'BX> " " 1 69 1) 9
# Q6* #22 ( X ( Y 7"
()E # 6E 3
129 =62 3 qg 4" ' %#
#6< + ,-. # )
*= "
U / " p[14]
0
f 0%
k-1 /6 0 (
Y 7"
< " 0
< k
p[15] Cricket )D6%qh 4# A ? X3 t6 3 L 8 "
+ ,-. 0 " <)% r % 0 k 2)> U = )D6% /
P6
% + ,-. n E 0 68 69
p[16] PlaceLab U qi 4" " "
X)E % =
"

VEO$ , - % U
(

% 3 G6G 3
' 62 (26 0 "
j
2 #) ( %
" 6 L 0 `<
2)A
!H % 0

0 %" #
3#
! $
1> (
7 % )%"
; 1< /
( * #>

!(26 0 0 : )
! "" 8 9
4 % () * L (> 3 " j 6E
" (I
!U [2] D26 $
!U H[% " X
1'
" <)% ; 82! " 6%
!( A
4 62
6
6L

D26 $ " 12 69
!U 0
6 < c ! ( 2 / ( 4[2] % 6 <
" )D6% /) * L 0 3 #
)D6% & )2
[2]" " 12 69
- 4" k 2)> /
+ ,-. J . 0 6 L R 0 k 2)>
" 4" " <)% 0 % #> ; 1< 0
3
!@ " " +
7 0 + ,-.

4[20,21] " ' %#


3 X x"
" ,-.
&.
)6 () = () * ( YL = h (x ) " X
/
4[21,22] #2
n )% ' 0 (A%
C
#6 (Message Digest) ; 69 ( -E 7 0 % ! " B 3
7 ?6 N "' # 3
6L
" " ?6 4[22]"
4[23] # 444 % )%" e G N "'
# ()<*

!" X p & #>

W6d 3

"X

(% 2

: ) " " 8 9 (% 2

: ) "" 8 9 " f B 3
q "" 8 9
E #6 }

S B

#6 } : ) " " 8 9 " f B 3 N


q "" 8 9
X,
4# "
'

c 3 A%

'

123 (

123 (

c 3 A%

B3

B 3N

f
4#2

"" 8 9
4 %
4 %

V)D> ( r 8 ? B 3
X, 6s

123 ( (D > : )
4#2 "
'
6L
(

#2!"

6~) /

= ! " B 3 #2!"
0 1

6 L ( ()D

SB

c
c

4# "
A)

6 L /66 3 1> ( 6% ! 7 # B 0 3 U / "


( G
% )%" e G + ,-.
"" 8 9 = 0 " E
pH
6%^ # =62 3 qu 4#2
" <)% 7 6 L
( 7R )
(% 0 ! 6E 3 (A%
?6 ( ^ "
4" " " > #2)% =
/)
)
( 6 L /) 0
3 H
6%^ # =62 3
(Blocker #22 <L w3 U qv 4"
6* > U /
2 ?8 >
2, ( RFID 0 " <)% p[17] Tag)
r % 0 k 2)> 1> 4[18] % U )D* & " #x
<L w3 ; ( y E U = RFID + ,-. 0 " <)%
8 " 1 -3 w3 / 4 % # " V #22
p[19] Bustle "
qz 4#2
" #D RFID # E
% (> 3 ?
1 ' 6 L 7"
> ( )D6% / "
1 7 % )6 L (T " D (T ( 2 + ,-.
Hitchhiking ; 2 "
0
E c U / 4 D6
( E 1L = " $ E $#2 /) #2 Application
4#!"
L (> 3 "

#6

0% , R

k sh

7 % 1
1' " (
!"
f
& % " Chaum P% 3 /6$ ; 1< / 4#
#6<
6 ) $ 6* {
E" 9 # N 2
zzv
E " 9 # < K,
f 4[20]# (I
" 0 )D6% / 4"
>1 #" 0 #
E" 9
X, #6
8?
$ )6V " f =62 3
0% <
(
1T
#2
" <)%
(Unblinding)
0 % ' 7 " f 7(Blinding)
( ) 6 + ,-.
4 % qVerification) V2% A),
4" ( > [19,20] B>

l
h (.)

t
> N9

q p0 #23 A, " " " > " 12 69 3 9 " ( 3 6d


@ = " # " X), : ) " " 8 9 (
`<
5#! / 2 4 % " X),
L 6s
123 q\ 4 % : ) " " 8 9 # " 0
E
+ A, ( 4# " : ) " " 8 9 0 " <)% 0 > 0 V
; AC : ) " " 8 9 " (
123 3J6L"
0 " <)% 0 > #2)D!
kD
" # #
/6 qa 4 " #2! E
6 L ( ()D
!>N9
" > : ) #6 = 7: ) " " 8 9
!
6s " (
2 (% 2 =
"
! qg 4 " "
qh 4 "
()E 2 )D6% " ' P% 3 ( % <
6 L + ,-.
6 L ( ()D
>N9
" GPS #2
6 L t6 3 + ?61V3 ( 4 D6
8 ' 4[24] #2!" t6 3
6L
( 6%
6 L ( ()D
>N9
6 L + ,-. c X)>

,
" 12 69
4"

9: ' Y

3 9 " () *
!" X #) @ / "
" ' ?
3 9 H[% "
"" b

D Z$;

- K"

S X

& #> " 7# # " <)%


3 9/ "(
!" X
f U #2
% l ( ;0^ 4# # " "
S B (x ) 0
c (S B (c (x ))) = S B (x )
|6! 7 c (x )

#6$ 3 " ' "


; 69 " 0 3 0 26X. MA%
3 !; 69 ( X 0 k 2)> K, HMAC ()
4"
()D

! > N 90

" <)%

: ) "" 8 9

!"

4#!"

" 6L (

such that x = h (Q ) and

Q is location based query


aggregates with location
?

2) A B : S B (c ( x )) if d 2 = d1
where d 2 = HMAC (c (x ), t , k sh )

3) A B : (S B (x ), S B (Q ))
where S B (x ) = c (S B (c (x )))
?

if S B (S B (c ( x ))) = c (x )
Otherwise STOP

4) A B : S B (Result, S B (x )) where Reslut


is location based query answer

E
!0

" <)% 3 9 p
" 6 L ( ()D

HMAC ()

j-G)D & ; 69
" B "" 8 9
HMAC ()
'
+
"
" (A%
0
?6 A
7 c (x )
#6 3
-, 7 ) "
; 69 #2
t
D3 /
- 4#2
!
" " 8 9 H[% 4 % " A
M> 0 ) "
AE ' ) 0 ( 2
# 7" f
c (x ) + A,
4# " *
A
(
' #
7c B 3 N
0 " <)%
S B (c (x ))
" A
" ' %# (S B (x )) 7 x
B "" 8 9 f
4#2
% q } (Y P% 3 '
?

S B (S B (x )) = x

9: '

O $'

>N9

U X

/ 3 M$ > 6
E
1 ?6
# ( Y %
4#
()E 2 A)
7; / 3 (I
123
/ 3M
7#!"
26X. !"
( / 3/ H % "
' 0 " <)% 0 >
% A) ;
]< K, 5 . = 0 ;
/ 3 / 2 4" "
26X.
% ( 8" 5 . 0
#
E
j-AL
% A)
)D6% " / 3 # "
7#!"
4 % "
. 6G
! 0
!;?6
) ";
/ 3 7#2 t
# 3 X
% ?6 ' " 8)E % M G3
%
;# ( e
0
;
" <)%
3 9 4[20] D6 9
" " 8 9 !"
" 6 L ( ()D
!>N9
4 % # ""
": )

if S B (S B (x )) = h (Q1 )
such that Q1 = S B (S B (Q ))

;
!"

N 9 0 " <)% ; 82! "


0% <
3 9
" " 8 9 !"
" 6 L ( ()D
!>
;
/ 3
"q p % @ "
7: )
0
2 4;
!0
1> / 3 / 0 " <)% q\
"EM
;
+
( % Y6 7;
/ 3
7;
/ 3 M
)1 + A, ( 4#2
! 0
! 0
!;?6
# * ( 0 6 #
/ 3/
4"
" " t6 3 0 V 7@ E
!
0
4 #6 ;
/ 3 yE 6
E / 6$" (
/ 0 () * O (
%
1< ?6 ;
!
t
;
+
% ;
/ 3 6
E
4#2
%2

3 9 p( -E

1) A B : ( A , t , c (x ), d1 = HMAC (c (x ), t , k sh ))

! > N 90
: ) "" 8 9

`<

;
( 06

1
> N 9 ! " ( -E 7(A)
7 3 9/ "
" " 6 3 & ; 69 7 "
< 7c B 3 P% 3 " E
/ )E % 4#)%
q: ) " " 8 9} B
'
" # ; AC 0 V
123 ( % ( * ( ; 69
() " > 4#2)D! ' #6$ 3 ( " L 7: ) " " 8 9
!0
A
7 c (x )
#6 3
-, HMAC
" " 6)E " : ) #6 ( % 123 0 4#2
0 1 4#2 #6$ 3
A) HMAC () # 3

q }

!0
1>
% ; / 3 S B (x )
(
> 1 123 ( (
/ " 4"
"
A
c (x ) /) "
# 3 X ?6 : ) " " 8 9
S B (x ) + A, 7 S B (c (x ))
4[20] " ' %# x

P% 3 (
?6
4 % ;0^ ;
/ 3= 7 6L
/ 3 " 5
A /6Xf3
7: ) " " 8 9
" A)
!/ 3 #18 7"
" <)% ;
!
/ 4[20] %
f U #2 X! B > D6$ =
J +
A ( %
!/ 3 (X!
D6$
8 9 / 2 4#2)D6 " <)% L 8 " # # " <)%
8 " =T = 7/ 3
% (
" : ) ""
/ 3 '( % MY / %
' #!" ; V ?6
" 4 6E
% " > A)
!/ 3 D6$ " ) "
/ 3 ' 7 D6$ / " ) " / 3 " > ;#, +
" "
;V #
! %
# ()E 2 A)
" " 8 9 7 # ()E 2 A) / 3 ' + 2 6s
" <)% 0 H9 4#2
"
) " ; 69 # RL )
D6$ (
' : ) " " 8 9 7/ 3 ! 0 J
(Y " (
( OD 4#2
( d A)
!/ 3
4 % D6$ & . 7"
bY

!/ 3 D6$
#18 " ? (
+
# 3
D6$ /
= 4"
: ) "" 8 9
( OD '
" 4 % : ) "" 8 9
E #6
" 66~3
X #L #6
# #6$ 3 !/ 3 ! f (X! (V6)
: 9 *" % ( D6$ H9 "
()E 2 A)
4" ( > av ( ) 6 + ,-.
4"

(
8 ? #) 0 " <)%
3 9R)
4 62
%
3 9 62
7
ECC

9: '

O $'

0 ! "" 8 9 (
>1 ( / 2
(
'A
7; / 3 #6$ 3 4
#2!
c-.
" " 8 9 ( 7 1 6 L ( ()D
> N 9 X!
>N9 " (
1> - 4#2
&%
; 69 " ? " " 8 9
X, #6 P% 3
'7 1
& % B " " 8 9 ( S B (Q ) S B (x )
;%
/6Xf3 ?6
1
>N9
; 69 / 4#2
4 % 1 > N 9 ! " ( -E x 0 4#2
A

' ; " r?> #) B " " 8 9 7; % ; 69


"
1
>N9
"
*?
S B (Q ) 2
(A%
G)D Y
' ! " ( -E " ' %#
(Y P% 3 q;
/ 3} f
H[% 4#2
4#2
% q\}
?

S B (S B (x )) = h (Q )

q\}

;
/ 3
123 ( 7(Y /
L +
"
( 7"
!0 ;
+
#
C
+ 2 " 4"
+ AC ?6
1
>N9
7"
' #2)%
; 69 " A) (> ) " " 8 9
H[% 4 % <
+
+ ,-. ( 6$ "
n )%
>N9
> (V6) 7: ) " " 8 9
( A "@ 9+
#!"
; 1T ; 69 7 "
'(
8" "
; 69 / 4#)%
(V6) 123 1 ' 0 4 D6 2
7#22
BX% _ )%
7#226
)! D
D6$ j-S 7#226
>N9
L ; 69 / - 4#2 " X (.
>N9
: ) "" 8 9
E #6 P% 3 0 7 D6 66~3
( " L : ) " " 8 9 123 (V6) " 4 % # ?
" " 66~3 ( " L > 1 " #! E ' 66~3 #6$ 3
: ) "" 8 9 (
/ " - 4 D6
M
#6$ 3 " E ( S B (c (x )) ) " S B (x ) /6 # 3 X
6 L ( 2 s 6 , (V6) " 4#2
L e A3 7 "
7# " X A
(% 2
T 7#26
4#
< "" 8 9 # " 0 +

( " "
f6 ! E

6L

S [

X, #6
8? & X U "
ECC U #!"
+ G6G 3 4 % [30-34] ECC
U /
0 4 % 3M% 2
!P6
)62 )6 i #6
\g #6
RSA U &"
+6
E
" U / - 4[30] #2
" V )6
( 0 6 7 )X #
219 5
7) T
8 ? #6
) T
0#
!:- 7 )X
3 A%
+ #L
,%
6D / 2 7[34-36] " #! E ) 6 62
!P6
[37] DSA f
RSA 0 3
U / 0 6$" /6X! ( 4" #! E 3M% 2
[25-29] RSA

/ 3 " 5
A
3 9 / " 8 " 1 ()
%
/ 30 J
" <)% A 123 2 4 % ;
( ()D
>N9 !
/ 2 4#2 A)
' 3

& X,
;0^

0 pTunblind qg4 % 0 % <


0 pT signature qh 4 % 0 % < B 3 N

;0^

0 pTverify qi 4 %

;0^

$ )6V "

pTencrypt qu 4 %

$ )6V "

pT decrypt qv 4 %

X, #6

" 69

" " <)%


3 9
6 1>
" ECC U 0 " <)%
" 12 69 3 9 0 %
0
/ " % l ( ;0^ 4 % # " "
\
8?
)D6% 0 " <)%
f #6$ 3 U
0 \
b 4[37] % # " <)% ECC
#2XL-, *#2 E 7 % n E ($ G / @ V2*
4#22 ( > av ( ) 6 + 6I?>
" 1> #2 3

f #6$ 3

%
8?

X, #6
*?
pTexe qz 4 %
4 % (V6) n )% > N 9 >

;0^

;0^
;0^

0
0

;V
2 ( (
%
1< Pre-computation
/ ( V ' 0 4[39] % 3 9 > 0 AL + A%
+ A% ; V , %
@ ? K, ; 1<
4 % # " <)%
3 9
6 3 " ' 0 7"
" R)
" + A% ; V 1> ;0^ ! 0
( %2 /# <
0 4 % # ""
\ & #>
" #2)D! (A%
L 3 9 > 0 AL + A%
4#2!" X y )E " E (
0 >&.
06 "
R)

ECC U 0 " <)%

3)

A B : (A , e , t , d1 = HMAC (e , t , k sh ))

is a rondom number such that 1 j n 1

e
, e = h ( R || x ),
u
x = h (q ), R = u R + v P
where u ,v are two secret random number,
such that e =

q is location based query


aggregates with location
?

A B : S B (e ) = d .e + j if d 2 = d1

where d is B's private key,


d 2 = HMAC (e , t , k sh )

A B :

A B :
S B (c ( x ))
A B :
S B ( x ), S B (Q )

3 9 0 % " 69 p( -E

A B : send request
A B : R = jP where j

4)

( A , t , c (x ), d1 )

" 12 69

2)

1)

0 p\ & #>
" "" 8 9

5)

A B : ((R , S B (e )), S B (q ))
?

T HMAC +
0

Tunblind
+0

if S B (e ).P = eQ + R
where S B (e ) = u . S B (e ) + v ,

T signature

S B (q ) = (tP , q + t (dP ))

where t is random integer,


Q is B 's public key
6) A B : S B ( Result , (R , S B (e )))

T decrypt +

A B :
T hash + Tverify
T
S B (Result, S B (x )) decrypt
+ Texe + Tencrypt

if S B (e ).P = e1Q + R where


q1 = (q + t (dP )) d (tP ),

8 9 X% " 3 9 / " + A%
V / ) 6
+
# 3 X + A% / - 4 % : ) " "
(
% 1 () / ( (> 3
4" ; V offline
,%
" A1 K, ECC
8? U k )
0 4"
: ) " " 8 9 X% + A%
;V
)D6% " " "
*?
$ )6V " f (A%
4[36] "
; V ^ 6D , % ECC
8?
8"
" 12 69 3 9 (D G #2!"
a & #>
av ( )
+ ,-. 1> 4 % " >
!U
4" ( >

x 1 = h (q1 ), e1 = h (R || x 1 ),
ECC U

0 " <)%

" 12 69

3 9 0 % " 69 p\

%
4
R
()
(A%
B3

U [

" 6! E U /
@ / "
3 0 ! ) 9 [39] U 0 " <)%
2 /#
(A%
1> ;0^
0 pT HMAC q p % #
1> ;0^ 0 pT hash q\ 4 % HMAC ! "
& X,
;0^
0 pTblind qa 4 % ! " B 3

!U
yEe " >
6<6 /6Xf3 1>

0 66~3
( A E%

8"

6<6

" 12 69
L" @!
+ ,-.

3 9 (D G pa & #>
= 0 " <)%
P%
%

"

( ()D

> N9

3 9
" 12 69

6L
V

!"

Hitchhiking

" # 3 " >}


q )

( ()D

" # 3 " >}


q )

( ()D

!H %
6L

( ()D

` < ($ D ($ G /

/)
!(
!; 69 M63 3

W [

3 6[
)D6% = (6 , (
( X ()%" 1T
_ )% q\ 7(<L q p[40,41] 0 #23 A, 7" 6* +
( 3-X 4+ ,-. " ? qg 7 ! " "
)%" qa 7BX%
t
( X = ! 7#
% @ / "
4#2)D! # b Y +-X
c 0 A6 3

" (
( G
/ )1 7Snooping ( X "
"
" 12 69 3 9 4[42] %
8 ? 0 " <)% + ,-.
!; 69 " c 0 % < B 3 0 " <)% & ; 69 "
]<
!; 69 8
7 8 ? 0 " <)%
#
" ' X ">
1 ' BX% _ )% / 2 4#2
" FG ( X 4"
6L
+
j3 9 /
0 4 % J
?6 !"H %
) 9 |6! 6El ( 0 6 7 > & . "
% stateless
0 ( X ?! / #2T > # 3 X > 1 H9 4" #
(X "
q: ) " " 8 9} % (
7 3 9
( " L # 9 j- (
(
( * ( 7#!" L
" 6 d /6X! 4# A A)
!; 69 (
8 %9
"" 8 9 (
3 6 X, 4" " " > ?6 # 0 " 9 "
6D 7#!" ; V ; 69 !
t6 3
: )
/ 2 7 % =A% 3 A%
V $ 0
3
# 0 " 9 7 3 9 0 ( X / #2T > # 3 X > 1
8 % 9 ;#, K, "0 #26
0 : ) "" 8 9
62 PA3 + 6I?>
4[39] "
A)
!; 69 (
4" ( > av ( " 12 69 3 9

"

U
e

!H %
6L

, 9 <K

0 % 129 U
0
f

!H %
6L

P% 3 123 ; % ; 69 J E ; / 3 " V 0
! # 3 X > 1 / 2 4" #! E ; V
L0V
4#!" M
: ) ! "" 8 9 "
>

Bustle "

" 5
A
01
(V6) " 4"
!; 69
3 +
# 3 X
4" E

7 3 !; 69 ( X "
"
*0 3 /6Xf3 K, ;
/ 3
!; 69 0 = |6! 0 > 1
D ( X / #2 " <)%

( !; 69 )E % 0 4" #! E J
?6 mitm ( X
L > 1 P% 3 1 ' 66~3 / ) T ( % ( *
" 7HMAC ! " () " > 7& ; 69 " 4 % R
8 ? ; 1T ; 69 " (D > : ) #6 7; % ; 69
/6Xf3 K, 7: ) " " 8 9
E #6
! ( !; 69 66~3 "
(X / D
; 69
" % ?6 ; " ; 69 66~3 4"
! ' # A) K,
7f
% ; 82! "
0 7 " #!
( X 4"
R (X
# ' " A) (> )
! |6! > 1 " E
D ?6 Spoofing
! 0 & ; 69 " 4 " #!
(X / ? 9
0
! >
7: ) " " 8 9 P% 3
! 0 K, ; / 3 ?6 ; % ; 69 " "
/6
4"
/6 0
! >
# ;
Y

\
"

[16] B. Schilit, A. LaMarca, G. Borriello, W. Griswold, D.


McDonald, E. Lazowska, A. Balachandran, J. Hong, V.
Iverson. "Challenge: Ubiquitous Location-Aware Computing
and the Place Lab Initiative", in: Proc. Of The First ACM
International Workshop on Wireless Mobile Applications
and Services on WLAN, 2003.
[17] A. Juels, R. L. Rivest, M. Szydlo, "The Blocker Tag:
Selective Blocking of RFID Tags for Consumer Privacy", in
8th ACM Conference on Computer and Communications
Security, pp. 103-111, 2003.
[18] Steve Lewis, "White Paper: A Basic Introduction to RFID
Technology and Its Use in the Supply Chain", 2004,
www.laranrfid.com.
[19] D.
Chaum,
"Untraceable
electronic
mail",
J.
Communications of the ACM, pp. 84-88, 1981.
[20] David Chaum, "Blind Signatures for Untraceable
Payments", Springer-Veriag, pp. 199-203, 1998.
[21] Dwayne Williams, Roger L. Davis, Principle of Computer
Security security and Beyond. McGraw Hill, 2004.
[22] A. Tanenbaum, Computer Network, Prentice Hall, 2003.
[23] E. Pitoura, G. Samaras, "Location Objects in Mobile", J.
IEEE Transactions, pp. 571-592, 2001.
[24] P. H. Dana, "Global Positioning System Overview", 2000,
http://www.colorado.edu/geography/gcraft/notes/gps/gps_f.h
tml.
[25] M. Rabin, "Digitalized signatures as intractable as
factorization", Technical Report MIT/LCS/TR-212, MIT
Laboratory for Computer Science, 1979.
[26] H. C. Williams, "An m3 public key encryption scheme", in:
Lecture Notes in Computer Science, pp. 358-368, 1986.
[27] H. C. Williams, "A modification of RSA public-key
encryption procedure", IEEE Transactions on Information
Theory, pp. 726-729, 1980.
[28] J. Loxton, D. Khoo, G. Bird, J. Seberry, "A cubic RSA code
equivalent to factorization", J. Cryptography, pp. 139-150,
1992.
[29] D. Boneh, "Twenty years of attacks on the RSA
cryptosystems", in: NOTICES OF THE AMS, pp. 203-213,
1999.
[30] N. Koblitz, A Course in Number Theory and Cryptography,
Springer-Verlag, 1994.
[31] N. Koblitz, Algebraic Aspects of Cryptography, SpringerVerlag, 1998.
[32] J. Silverman, The Arithmetic of Elliptic Curves, SpringerVerlag, New York, 1986.
[33] J. Silverman, Advanced Topics in the Arithmetic of Elliptic
Curves, Springer-Verlag, New York, 1994.
[34] N. Koblitz, A. Menezes, S. Vanstone, "The State of Elliptic
Curve Cryptography", in: Kluwer Academic Publishers, pp.
173193, 2000.
[35] H. Pietilainen, "Elliptic curve cryptography on smart cards",
MSc. Thesis, Helsinki University of Technology, 2000.
[36] M.J.B. Robshaw, Yiqun Lisa Yin, "Overview of Elliptic
Curve Cryptosystems", an RSA Laboratories Technical Note,
1997.
[37] M. S. Hwang, P. C. Sung, "A Study of Micro-payment Based
on One-Way Hash Chain", J. Network Security, pp. 8190,
2006.

)$*
+ '
9 7 0% , R (

9 ($

./0

4 avi 7 1<

8 " 7#

4#

6 : )
! "" 8 9
!P6
6 L ( ()D
!>N90 ;
" <)% c d
4#
6
f
2A
' 0 " <)% 1>
b
f6 ! E 0 " <)%
3 9 R)
P6
" 3 9 62
7+ 6
E # ""
# l M$ Y ( (> 3 4 * L % "
P%
% ( 3 9 0 6 ;#, #2
36
E ?6
H % 6<6 6 G3 ;#, ?6 ( A
E % 0 66~3
6*(V6) /62T 7
6 L 0 `<
1>
6<6 / )1 1 #2 0 6 / )X
3 9/ ( "
4#2
!
E
0 `<

< $
[1]

[2]

[3]

[4]

[5]

[6]

[7]

[8]

[9]

[10]

[11]

, #I

.O

O$ $
%2

(
[12]

[39] C. C. Yang, Y. L. Tang, R. C. Wang, H. W. Yang, "A secure


and efficient authentication protocol for anonymous channel
in wireless communications", J. Applied Mathematics and
Computation, pp. 14311439, 2005.
[40] M. Bishop, Computer Security: Art and Science, Addison
Wesley Professional, 2003.

, -Y

,$]^0 " 7 6
4 avh 7; 1T T 7t +

[13]

[14]

D
)

[15]

[42] M. Mallick, Mobile and Wireless Design Essentials, Wiley


Publishing Inc, 2003.

P. Bhaskar, S. I. Ahamed, "Privacy in Pervasive Computing


and Open Issues", in: Proc. of the second International
Conference on Availability, Reliability and Security
(ARES'07), IEEE 2007.
A. Lubinski, "Security Issues in Mobile Database Access",
in: Proc. of the 12th Annual IFIP WG 11.3 Working
Conference on Database Security, 1998.
T. Imielinksi, B.R. Badrinath, "Wireless mobile computing:
challenges in data management", Communications of ACM,
1994.
S. K. Madria, M. Mohania, S. S. Bhowmick, B. Bhargava,
"Mobile Data and Transaction Management", J. Information
Sciences, pp. 279-309, 2002.
A. R. Beresford, F. Stajano, "Location Privacy in Pervasive
Computing. J. PERVASIVE computing", IEEE CS and IEEE
Communications Society, pp. 46-55, 2003.
A. Gorlach, A. Heinemann, W. Terpstra, "Survey on
Location Privacy in Pervasive Computing", University of
Technology, Germany, 2004.
M. Langheinrich, "Privacy by Design Principles of
Privacy-Aware Ubiquitous Systems", Ubicomp, volume 2201
of Lecture Notes in Computer Science, pp. 273-291, 2001.
M. Langheinrich, "A Privacy Awareness System for
Ubiquitous Computing Environments", Ubicomp, volume
2498 of Lecture Notes in Computer Science, pp. 237-245,
2002.
E. Snekkenes, "Concepts for Personal Location Privacy
Policies", in: Proc. of the 3rd ACM Conference on
Electronic Commerce, pp. 48-57, 2001.
U. Hengartner, P. Steenkiste, "Protecting Access to People
Location Information", Lecture Notes in Computer Science,
pp. 25-38, 2004.
J. Kong and X. Hong, "ANODR: Anonymous On Demand
Routing with Untraceable Routes for Mobile Ad-hoc
Networks", in: Proc. of the 4th ACM international symposium
on Mobile ad-hoc Networking & computing, pp. 291-302,
2003.
H. Federrath, A. Jerichow, A. Pfitzmann, "Mixes in Mobile
Communication Systems: Location Management with
Privacy", J. Information Hiding, pp. 121-135, 1996.
A. R. Beresford, F. Stajano, "Location Privacy in Pervasive
Computing. PERVASIVE computing", IEEE CS and IEEE
Communications Society, pp. 46-55, 2003.
M. Gruteser, D. Grunwald, "Anonymous Usage of LocationBased Services Through Spatial and Temporal Cloaking", in
MobiSys (USENIX), pp. 31-42, 2003.
N. B. Priyantha, A. Chakraborty, H. Balakrishnan, "The
Cricket Location-Support System", in Mobile Computing and
Networking, pp. 32-43, 2000.

Vous aimerez peut-être aussi