Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
On the Exact Security of Full Domain Hash
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Short Signatures from the Weil Pairing
Journal of Cryptology
The Evolution of RFID Security
IEEE Pervasive Computing
A comparison of MNT curves and supersingular curves
Applicable Algebra in Engineering, Communication and Computing
VPriv: protecting privacy in location-based vehicular services
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
PrETP: privacy-preserving electronic toll pricing
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
SEC'11 Proceedings of the 20th USENIX conference on Security
A cryptographic framework for the controlled release of certified data
SP'04 Proceedings of the 12th international conference on Security Protocols
Hi-index | 0.00 |
Traditional stop-and-pay toll booths inconvenience drivers and are infeasible for complicated urban areas. As a way to minimize traffic congestion and avoid the inconveniences caused by toll booths, electronic tolling has been suggested. For example, as drivers pass certain locations, a picture of their licence plate may be taken and a bill sent to their home. However, this simplistic method allows the administrator of the system to build a dossier on drivers. While this may be an attractive feature for law enforcement, a society may not wish to trust the tolling agency with such detailed information. We present SPEcTRe, a suite of protocols to maintain driver privacy while ensuring that tolls are accurately collected. Existing protocols for privacy-preserving electronic toll pricing suffer from computational challenges and require an undesirable amount of location data to be collected. We present two schemes: the spot-record scheme, which requires the same amount of location data exposure as prior privacy-preserving schemes, but runs much faster, and the no-record scheme, which collects no location information from honest users and is still able to run efficiently.