[1] 中国卫星导航定位协会.2021中国卫星导航与位置服务产业发展白皮书[EB/OL].[2022-04-10].http://www.glac.org.cn/index.php?m=content&c=index&a=lists&catid=18. China Technical Application Association for Global Positioning System.2021 white paper on the development of China's satellite navigation and location services industry[EB/OL].[2022-04-10].http://www.glac.org.cn/index.php?m=content&c=index&a=lists&catid=18. (in Chinese) [2] LUO W Y, HENGARTNER U.VeriPlace:a privacy-aware location proof architecture[C]//Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems.New York, USA:ACM Press, 2010:23-32. [3] JAVALI C, REVADIGAR G, RASMUSSEN K B, et al.I am Alice, I was in wonderland:secure location proof generation and verification protocol[C]//Proceedings of the 41st Conference on Local Computer Networks.Washington D.C., USA:IEEE Press, 2016:477-485. [4] WANG X L, PANDE A, ZHU J D, et al.STAMP:enabling privacy-preserving location proofs for mobile users[J].IEEE/ACM Transactions on Networking, 2016, 24(6):3276-3289. [5] TALASILA M, CURTMOLA R, BORCEA C.LINK:location verification through immediate neighbors knowledge[C]//Proceedings of International Conference on Mobile and Ubiquitous Systems:Computing, Networking, and Services.Berlin, Germany:Springer, 2012:210-223. [6] GAMBS S, KILLIJIAN M O, ROY M, et al.PROPS:a privacy-preserving location proof system[C]//Proceedings of the 33rd International Symposium on Reliable Distributed Systems.Berlin, Germany:Springer, 2014:1-10. [7] YANG Z, JIN C L, NING J T, et al.Group time-based one-time passwords and its application to efficient privacy-preserving proof of location[C]//Proceedings of Annual Computer Security Applications Conference.New York, USA:ACM Press, 2021:497-512. [8] ALSWAILIM M A, HASSANEIN H S, ZULKERNINE M.A reputation system to evaluate participants for participatory sensing[C]//Proceedings of Global Communications Conference.Washington D.C., USA:IEEE Press, 2016:1-6. [9] WATERS B R, FELTEN E W.Secure, private proofs of location[R].Princeton University:Department of Technical, 2002. [10] GRAHAM M, GRAY D.Protecting privacy and securing the gathering of location proofs-the secure location verification proof gathering protocol[C]//Proceedings of International Conference on Security and Privacy in Mobile Information and Communication Systems.Berlin, Germany:Springer, 2009:160-171. [11] ZHU Z C, CAO G H.APPLAUS:a privacy-preserving location proof updating system for location-based services[C]//Proceedings of IEEE INFOCOM.Washington D.C., USA:IEEE Press, 2011:1889-1897. [12] DUPIN A, ROBERT J M, BIDAN C.Location-proof system based on secure multi-party computations[C]//Proceedings of International Conference on Provable Security Provable Security.Berlin, Germany:Springer, 2018:22-39. [13] 吴炜, 刘儿兀, 杨昌鑫, 等.基于区块链的零知识位置证明系统设计[J].网络与信息安全学报, 2020, 6(2):67-76. WU W, LIU E W, YANG C X, et al.Design of blockchain based zero-knowledge proof of location system[J].Chinese Journal of Network and Information Security, 2020, 6(2):67-76.(in Chinese) [14] LAMPORT L.Password authentication with insecure communication[J].Communications of the ACM, 1981, 24(11):770-772. [15] HALLER N W.The S/KEY one-time password system, RFC1760[S].San Diego, USA:Network Working Group, 1995:151-157. [16] JIN C L, YANG Z, VAN D M, et al.Proof of aliveness[C]//Proceedings of the 35th Annual Computer Security Applications Conference.New York, USA:ACM Press, 2019:1-16. [17] KOGAN D, MANOHAR N, BONEH D.T/key:second-factor authentication from secure hash chains[C]//Proceedings of the ACM SIGSAC Conference on Computer and Communications Security.New York, USA:ACM Press, 2017:983-999. [18] ZHANG Y Y, KASAHARA S, SHEN Y L, et al.Smart contract-based access control for the Internet of Things[J].IEEE Internet of Things Journal, 2019, 6(2):1594-1605. [19] 张亮, 刘百祥, 张如意, 等.区块链技术综述[J].计算机工程, 2019, 45(5):1-12. ZHANG L, LIU B X, ZHANG R Y, et al.Overview of blockchain technology[J].Computer Engineering, 2019, 45(5):1-12.(in Chinese) [20] 王文, 黄开枝, 马林.基于信任度的自私用户协作激励机制[J].计算机工程, 2016, 42(11):165-169, 176. WANG W, HUANG K Z, MA L.Cooperation incentive mechanism for selfish users based on trust degree[J].Computer Engineering, 2016, 42(11):165-169, 176.(in Chinese) [21] PENG D, WU F, CHEN G H.Pay as how well you do:a quality based incentive mechanism for crowdsensing[C]//Proceedings of the 16th International Symposium on Mobile Ad Hoc Networking and Computing.New York, USA:ACM Press, 2015:177-186. [22] JARVINEN K, KISS Á, SCHNEIDER T, et al.Faster privacy-preserving location proximity schemes[C]//Proceedings of International Conference on Cryptology and Network Security.Berlin, Germany:Springer, 2018:3-22. [23] JÄRVINEN K, KISS Á, SCHNEIDER T, et al.Faster privacy-preserving location proximity schemes for circles and polygons[J].IET Information Security, 2020, 14(3):254-265. [24] JOHNSON D, MENEZES A, VANSTONE S.The Elliptic Curve Digital Signature Algorithm (ECDSA)[J].International Journal of Information Security, 2001, 1(1):36-63. [25] ELGAMAL T.A public key cryptosystem and a signature scheme based on discrete logarithms[J].IEEE Transactions on Information Theory, 1985, 31(4):469-472. |