Blind identity-based encryption (IBE) Regular [S84,BF01,C01]: c = Enc(“Bob”, m) 9
Blind identity-based encryption (IBE) Regular [S84,BF01,C01]: c = Enc(“Bob”, m) 9
Blind identity-based encryption (IBE) Regular [S84,BF01,C01]: c = Enc(“Bob”, m) “Bob” 9
Blind identity-based encryption (IBE) Regular [S84,BF01,C01]: c = Enc(“Bob”, m) “Bob” sk Bob 9
Blind identity-based encryption (IBE) Regular [S84,BF01,C01]: m = Dec(sk Bob ,c) c = Enc(“Bob”, m) “Bob” sk Bob 9
Blind identity-based encryption (IBE) Regular [S84,BF01,C01]: m = Dec(sk Bob ,c) c = Enc(“Bob”, m) “Bob” sk Bob Blind [GH07]: 9
Blind identity-based encryption (IBE) Regular [S84,BF01,C01]: m = Dec(sk Bob ,c) c = Enc(“Bob”, m) “Bob” sk Bob Blind [GH07]: c = Enc(“Bob”, m) 9
Blind identity-based encryption (IBE) Regular [S84,BF01,C01]: m = Dec(sk Bob ,c) c = Enc(“Bob”, m) “Bob” sk Bob Blind [GH07]: c = Enc(“Bob”, m) req(“Bob”) 9
Blind identity-based encryption (IBE) Regular [S84,BF01,C01]: m = Dec(sk Bob ,c) c = Enc(“Bob”, m) “Bob” sk Bob Blind [GH07]: c = Enc(“Bob”, m) req(“Bob”) resp(sk Bob ) 9
Blind identity-based encryption (IBE) Regular [S84,BF01,C01]: m = Dec(sk Bob ,c) c = Enc(“Bob”, m) “Bob” sk Bob 1. Extract sk Bob from resp 2. m = Dec(sk Bob ,c) Blind [GH07]: c = Enc(“Bob”, m) req(“Bob”) resp(sk Bob ) 9
Blind identity-based encryption (IBE) Regular [S84,BF01,C01]: m = Dec(sk Bob ,c) c = Enc(“Bob”, m) “Bob” sk Bob 1. Extract sk Bob from resp 2. m = Dec(sk Bob ,c) Blind [GH07]: c = Enc(“Bob”, m) req(“Bob”) resp(sk Bob ) So the authority doesn’t learn which key is being extracted 9
Outline Milo A generic toll collection system Cryptographic background A look back at (adapted) PrETP A new Audit protocol Evaluation Conclusions 10
How privacy-preserving toll pricing works 11
How privacy-preserving toll pricing works segments 11
How privacy-preserving toll pricing works A segments 11
How privacy-preserving toll pricing works A segments 11
How privacy-preserving toll pricing works A B segments 11
How privacy-preserving toll pricing works A B segments (A-B,13:01-13:02) 11
How privacy-preserving toll pricing works A B segments (A-B,13:01-13:02) 11
How privacy-preserving toll pricing works A B C segments (A-B,13:01-13:02) 11
How privacy-preserving toll pricing works A B C segments (A-B,13:01-13:02) (B-C,13:02-13:03) 11
How privacy-preserving toll pricing works A B C segments (A-B,13:01-13:02) (B-C,13:02-13:03) 11
How privacy-preserving toll pricing works A B C segments (A-B,13:01-13:02) (B-C,13:02-13:03) D 11
How privacy-preserving toll pricing works A B C segments (A-B,13:01-13:02) (B-C,13:02-13:03) (C-D,13:03-13:04) D 11
How privacy-preserving toll pricing works 12
How privacy-preserving toll pricing works OBU 12
How privacy-preserving toll pricing works OBU segments 12
How privacy-preserving toll pricing works TSP OBU segments 12
How privacy-preserving toll pricing works TSP Payment OBU segments 12
How privacy-preserving toll pricing works TSP Payment OBU segments 12
How privacy-preserving toll pricing works Check information and charge driver what they owe TSP Payment OBU segments 12
How privacy-preserving toll pricing works Check information and charge driver what they owe TSP Payment TC OBU segments 12
How privacy-preserving toll pricing works Check information and charge driver what they owe TSP Payment TC OBU segments 12
How privacy-preserving toll pricing works Check information and charge driver what they owe TSP Payment Audit TC OBU segments 12
How privacy-preserving toll pricing works Check information and charge driver what they owe TSP Check outcome of Audit to ensure driver is being honest Payment Audit TC OBU segments 12
An adapted version of PrETP 13
An adapted version of PrETP {c i , π i } i 13
Recommend
More recommend