ABSTRACT
Traditional stop-and-pay toll booths inconvenience drivers and are infeasible for complicated urban areas. As a way to minimize traffic congestion and avoid the inconveniences caused by toll booths, electronic tolling has been suggested. For example, as drivers pass certain locations, a picture of their licence plate may be taken and a bill sent to their home. However, this simplistic method allows the administrator of the system to build a dossier on drivers. While this may be an attractive feature for law enforcement, a society may not wish to trust the tolling agency with such detailed information. We present SPEcTRe, a suite of protocols to maintain driver privacy while ensuring that tolls are accurately collected. Existing protocols for privacy-preserving electronic toll pricing suffer from computational challenges and require an undesirable amount of location data to be collected. We present two schemes: the spot-record scheme, which requires the same amount of location data exposure as prior privacy-preserving schemes, but runs much faster, and the no-record scheme, which collects no location information from honest users and is still able to run efficiently.
- Aranha, D. F., and Gouvêa, C. P. L. RELIC is an Efficient LIbrary for Cryptography. http://code.google.com/p/relic-toolkit/.Google Scholar
- Balasch, J., Rial, A., Troncoso, C., Geuens, C., Preneel, B., and Verbauwhede, I. PrETP: Privacy-Preserving Electronic Toll Pricing. In 19th USENIX Security Symposium (Washington, DC, 2010). Google ScholarDigital Library
- Bangerter, E., Camenisch, J., and Lysyanskaya, A. A Cryptographic Framework for the Controlled Release of Certified Data. In Security Protocols Workshop (2004), pp. 20--42. Google ScholarDigital Library
- Bellare, M., Namprempre, C., Pointcheval, D., and Semanko, M. The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme. Journal of Cryptology 16 (2003), 185--215.Google ScholarCross Ref
- Boneh, D., Lynn, B., and Shacham, H. Short Signatures from the Weil Pairing. Journal of Cryptology 17 (2004), 297--319. Google ScholarDigital Library
- Cervero, R. The Transit Metropolis: A Global Inquiry. Transportation / Planning. Island Press, 1998, ch. 7.Google Scholar
- Chaum, D. Blind Signatures for Untraceable Payments. In CRYPTO'82 (1982), pp. 199--203.Google Scholar
- Chaum, D. Security Without Identification: Transaction Systems to Make Big Brother Obsolete. Commun. ACM 28 (October 1985), 1030--1044. Google ScholarDigital Library
- Coron, J.-S. On the Exact Security of Full Domain Hash. In Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology (London, UK, 2000), CRYPTO '00, pp. 229--235. Google ScholarDigital Library
- Dept of Transportation. Dedicated Short Range Communications. http://www.standards.its.dot.gov/Documents/advisories/dsrc_advisory.htm. ITS Standards Advisories No.3.Google Scholar
- Hubbard, P. Urban congestion--why 'free' roads are costly. Treasury Department, Commonwealth of Australia.Google Scholar
- Klein, L. A. Sensor Technologies and Data Requirements for ITS. Artech House, 2001, ch. 7.Google Scholar
- Litman, T. London Congestion Pricing: Implications for Other Cities. http://www.vtpi.org/london.pdf, 2003.Google Scholar
- Lysyanskaya, A., Rivest, R. L., Sahai, A., and Wolf, S. Pseudonym Systems. In Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography (London, UK, 2000), SAC '99, pp. 184--199. Google ScholarDigital Library
- Meiklejohn, S., Mowery, K., Checkoway, S., and Shacham, H. The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion. In Proceedings of USENIX Security 2011 (San Francisco, CA, August 2011). Google ScholarDigital Library
- Newmarker, C. Toll Records Catch Unfaithful Spouses. http://www.usatoday.com/tech/news/surveillance/2007-08-10-ezpass_N.htm", August 2007.Google Scholar
- Page, D., Smart, N. P., and Vercauteren, F. A comparison of MNT curves and supersingular curves. Appl. Algebra Eng., Commun. Comput. 17 (October 2006), 384. Google ScholarCross Ref
- Popa, R. A., Balakrishnan, H., and Blumberg, A. VPriv: Protecting Privacy in Location-Based Vehicular Services. In 18th USENIX Security Symposium (Montreal, Canada, August 2009). Google ScholarDigital Library
- Rieback, M. R., Crispo, B., and Tanenbaum, A. S. The Evolution of RFID Security. IEEE Pervasive Computing 5 (January 2006), 62--69. Google ScholarDigital Library
Index Terms
- SPEcTRe: spot-checked private ecash tolling at roadside
Recommendations
A Group Signature Based Electronic Toll Pricing System
ARES '12: Proceedings of the 2012 Seventh International Conference on Availability, Reliability and SecurityWith the prevalence of GNSS technologies, nowadays freely available for everyone, location-based vehicle services such as electronic tolling pricing systems and pay-as-you-drive services are rapidly growing. Because these systems collect and process ...
PSP: Private and secure payment with RFID
RFID can be used for a variety of applications, e.g., to conveniently pay for public transportation. However, achieving security and privacy of payment is challenging due to the extreme resource restrictions of RFID tags. In this paper, we propose PSP - ...
PSP: private and secure payment with RFID
WPES '09: Proceedings of the 8th ACM workshop on Privacy in the electronic societyRFID can be used for a variety of applications, e.g., to conveniently pay for public transportation. However, achieving security and privacy of payment is challenging due to the extreme resource restrictions of RFID tags. In this paper, we propose PSP --...
Comments