TY - GEN
T1 - Efficient private proximity testing with GSM location sketches
AU - Lin, Zi
AU - Foo Kune, Denis
AU - Hopper, Nicholas
PY - 2012
Y1 - 2012
N2 - A protocol for private proximity testing allows two mobile users communicating through an untrusted third party to test whether they are in close physical proximity without revealing any additional information about their locations. At NDSS 2011, Narayanan and others introduced the use of unpredictable sets of "location tags" to secure these schemes against attacks based on guessing another user's location. Due to the need to perform privacy-preserving threshold set intersection, their scheme was not very efficient. We provably reduce threshold set intersection on location tags to equality testing using a de-duplication technique known as shingling. Due to the simplicity of private equality testing, our resulting scheme for location tag-based private proximity testing is several orders of magnitude more efficient than previous solutions. We also explore GSM cellular networks as a new source of location tags, and demonstrate empirically that our proposed location tag scheme has strong unpredictability and reproducibility.
AB - A protocol for private proximity testing allows two mobile users communicating through an untrusted third party to test whether they are in close physical proximity without revealing any additional information about their locations. At NDSS 2011, Narayanan and others introduced the use of unpredictable sets of "location tags" to secure these schemes against attacks based on guessing another user's location. Due to the need to perform privacy-preserving threshold set intersection, their scheme was not very efficient. We provably reduce threshold set intersection on location tags to equality testing using a de-duplication technique known as shingling. Due to the simplicity of private equality testing, our resulting scheme for location tag-based private proximity testing is several orders of magnitude more efficient than previous solutions. We also explore GSM cellular networks as a new source of location tags, and demonstrate empirically that our proposed location tag scheme has strong unpredictability and reproducibility.
UR - http://www.scopus.com/inward/record.url?scp=84865823964&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84865823964&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-32946-3_7
DO - 10.1007/978-3-642-32946-3_7
M3 - Conference contribution
AN - SCOPUS:84865823964
SN - 9783642329456
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 73
EP - 88
BT - Financial Cryptography and Data Security - 16th International Conference, FC 2012, Revised Selected Papers
T2 - 16th International Conference on Financial Cryptography and Data Security, FC 2012
Y2 - 27 February 2012 through 2 March 2012
ER -