{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:58:25Z","timestamp":1773511105718,"version":"3.50.1"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030014452","type":"print"},{"value":"9783030014469","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01446-9_2","type":"book-chapter","created":{"date-parts":[[2018,10,6]],"date-time":"2018-10-06T17:46:13Z","timestamp":1538847973000},"page":"22-39","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Location-Proof System Based on Secure Multi-party Computations"],"prefix":"10.1007","author":[{"given":"Aur\u00e9lien","family":"Dupin","sequence":"first","affiliation":[]},{"given":"Jean-Marc","family":"Robert","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Bidan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,7]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Bultel, X., Gambs, S., G\u00e9rault, D., Lafourcade, P., Onete, C., Robert, J.M.: A prover-anonymous and terrorist-fraud resistant distance-bounding protocol. In: Proceedings of WISec, pp. 121\u2013133. ACM (2016)","DOI":"10.1145\/2939918.2939919"},{"key":"2_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1007\/3-540-39200-9_37","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2003","author":"R Cramer","year":"2003","unstructured":"Cramer, R., Fehr, S., Ishai, Y., Kushilevitz, E.: Efficient multi-party computation over rings. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 596\u2013613. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-39200-9_37"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Davis, B., Chen, H., Franklin, M.: Privacy-preserving alibi systems. In: Proceedings of ASIACCS, pp. 1\u201310. ACM (2012)","DOI":"10.1145\/2414456.2414475"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/978-3-642-33167-1_37","volume-title":"Computer Security \u2013 ESORICS 2012","author":"M Franklin","year":"2012","unstructured":"Franklin, M., Zhang, H.: Unique group signatures. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 643\u2013660. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33167-1_37"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Gambs, S., Killijian, M.O., Roy, M., Traor\u00e9, M.: PROPS: a privacy-preserving location proof system. In: Proceedings of SRDS, pp. 1\u201310. IEEE (2014)","DOI":"10.1109\/SRDS.2014.37"},{"key":"2_CR6","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-642-04434-2_14","volume-title":"Security and Privacy in Mobile Information and Communication Systems","author":"M Graham","year":"2009","unstructured":"Graham, M., Gray, D.: Protecting privacy and securing the gathering of location proofs \u2013 the secure location verification proof gathering protocol. In: Schmidt, A.U., Lian, S. (eds.) MobiSec 2009. LNICST, vol. 17, pp. 160\u2013171. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04434-2_14"},{"key":"2_CR7","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1016\/j.cose.2011.12.003","volume":"31","author":"O Hasan","year":"2012","unstructured":"Hasan, O., Brunie, L., Bertino, E.: Preserving privacy of feedback providers in decentralized reputation systems. Comput. Secur. 31, 816\u2013826 (2012)","journal-title":"Comput. Secur."},{"key":"2_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14303-8","volume-title":"Efficient Secure Two-Party Protocols: Techniques and Constructions","author":"C Hazay","year":"2010","unstructured":"Hazay, C., Lindell, Y.: Efficient Secure Two-Party Protocols: Techniques and Constructions. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14303-8"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1007\/11496137_31","volume-title":"Applied Cryptography and Network Security","author":"H-Y Lin","year":"2005","unstructured":"Lin, H.-Y., Tzeng, W.-G.: An efficient solution to the millionaires\u2019 problem based on homomorphic encryption. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 456\u2013466. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11496137_31"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Luo, W., Hengartner, U.: Proving your location without giving up your privacy. In: Proceedings of the HotMobile, pp. 7\u201312. ACM (2010)","DOI":"10.1145\/1734583.1734586"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Luo, W., Hengartner, U.: Veriplace: a privacy-aware location proof architecture. In: Proceedings of SIGSPATIAL, pp. 23\u201332. ACM (2010)","DOI":"10.1145\/1869790.1869797"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48910-X_16"},{"issue":"8","key":"2_CR13","doi-asserted-by":"publisher","first-page":"2109","DOI":"10.1109\/TMC.2015.2483498","volume":"15","author":"Anh Pham","year":"2016","unstructured":"Pham, A., Huguenin, K., Bilogrevic, I., Dacosta, I., Hubaux, J.P.: SecureRun: cheat-proof and private summaries for location-based activities. In: Proceedings of TMC, pp. 2109\u20132123. IEEE (2015)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Saroiu, S., Wolman, A.: Enabling new mobile applications with location proofs. In: Proceedings of HotMobile, pp. 1\u20136. ACM (2009)","DOI":"10.1145\/1514411.1514414"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of WISEC, pp. 1\u201310. ACM (2003)","DOI":"10.1145\/941312.941313"},{"key":"2_CR16","unstructured":"Singelee, D., Preneel, B.: Location verification using secure distance bounding protocols. In: Proceedings of MASS, pp. 7\u201314. IEEE (2005)"},{"key":"2_CR17","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-642-29154-8_18","volume-title":"Mobile and Ubiquitous Systems: Computing, Networking, and Services","author":"M Talasila","year":"2012","unstructured":"Talasila, M., Curtmola, R., Borcea, C.: LINK: location verification through immediate neighbors knowledge. In: S\u00e9nac, P., Ott, M., Seneviratne, A. (eds.) MobiQuitous 2010. LNICST, vol. 73, pp. 210\u2013223. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29154-8_18"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Zhu, Z., Cao, G.: APPLAUS: a privacy-preserving location proof updating system for location-based services. In: Proceedings of INFOCOM, pp. 1889\u20131897. IEEE (2011)","DOI":"10.1109\/INFCOM.2011.5934991"}],"container-title":["Lecture Notes in Computer Science","Provable Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01446-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,25]],"date-time":"2019-10-25T17:31:26Z","timestamp":1572024686000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01446-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030014452","9783030014469"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01446-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ProvSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Provable Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"provsec2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ssl.informatics.uow.edu.au\/provsec2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}