How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Complexity and Fast Algorithms for Multiexponentiations
IEEE Transactions on Computers
Wallet Databases with Observers
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
An Efficient Divisible Electronic Cash Scheme
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
RIPEMD-160: A Strengthened Version of RIPEMD
Proceedings of the Third International Workshop on Fast Software Encryption
Universally Composable Security: A New Paradigm for Cryptographic Protocols
FOCS '01 Proceedings of the 42nd IEEE symposium on Foundations of Computer Science
Enhancing Security and Privacy in Traffic-Monitoring Systems
IEEE Pervasive Computing
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Pripayd: privacy friendly pay-as-you-drive insurance
Proceedings of the 2007 ACM workshop on Privacy in electronic society
How to protect privacy in floating car data systems
Proceedings of the fifth ACM international workshop on VehiculAr Inter-NETworking
Privacy-Friendly Electronic Traffic Pricing via Commits
Formal Aspects in Security and Trust
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
A signature scheme with efficient protocols
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Space-efficient private search with applications to rateless codes
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
VPriv: protecting privacy in location-based vehicular services
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
An embedded platform for privacy-friendly road charging applications
Proceedings of the Conference on Design, Automation and Test in Europe
On the anonymity of periodic location samples
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
SP 800-38C. Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality
Private memoirs of a smart meter
Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building
SEC'11 Proceedings of the 20th USENIX conference on Security
Plug-in privacy for smart metering billing
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Differentially private billing with rebates
IH'11 Proceedings of the 13th international conference on Information hiding
Privacy-preserving smart metering
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
SPEcTRe: spot-checked private ecash tolling at roadside
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Towards ensuring client-side computational integrity
Proceedings of the 3rd ACM workshop on Cloud computing security workshop
Privacy and accountability for location-based aggregate statistics
Proceedings of the 18th ACM conference on Computer and communications security
ACM SIGMOBILE Mobile Computing and Communications Review
Formal methods as a link between software code and legal rules
SEFM'11 Proceedings of the 9th international conference on Software engineering and formal methods
Selective location blinding using hash chains
SP'11 Proceedings of the 19th international conference on Security Protocols
Efficient schemes for anonymous yet authorized and bounded use of cloud resources
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
EuroPKI'11 Proceedings of the 8th European conference on Public Key Infrastructures, Services, and Applications
Privacy by design: a formal framework for the analysis of architectural choices
Proceedings of the third ACM conference on Data and application security and privacy
Privacy-preserving smart metering with regional statistics and personal enquiry services
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Privacy-preserving billing for e-ticketing systems in public transportation
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
ZQL: a compiler for privacy-preserving data processing
SEC'13 Proceedings of the 22nd USENIX conference on Security
Hi-index | 0.00 |
Current Electronic Toll Pricing (ETP) implementations rely on on-board units sending fine-grained location data to the service provider. We present PrETP, a privacy-preserving ETP system in which on-board units can prove that they use genuine data and perform correct operations while disclosing the minimum amount of location data. PrETP employs a cryptographic protocol, Optimistic Payment, which we define in the ideal-world/real-world paradigm, construct, and prove secure under standard assumptions. We provide an efficient implementation of this construction and build an on-board unit on an embedded microcontroller which is, to the best of our knowledge, the first self-contained prototype that supports remote auditing. We thoroughly analyze our system from a security, legal and performance perspective and demonstrate that PrETP is suitable for low-cost commercial applications.