Papers
Topics
Authors
Recent
Search
2000 character limit reached

Zero-Knowledge Proof of Distinct Identity: a Standard-compatible Sybil-resistant Pseudonym Extension for C-ITS

Published 20 Mar 2024 in cs.CR and cs.NI | (2403.14020v3)

Abstract: Pseudonyms are widely used in Cooperative Intelligent Transport Systems (C-ITS) to protect the location privacy of vehicles. However, the unlinkability nature of pseudonyms also enables Sybil attacks, where a malicious vehicle can pretend to be multiple vehicles at the same time. In this paper, we propose a novel protocol called zero-knowledge Proof of Distinct Identity (zk-PoDI,) which allows a vehicle to prove that it is not the owner of another pseudonym in the local area, without revealing its actual identity. Zk-PoDI is based on the Diophantine equation and zk-SNARK, and does not rely on any specific pseudonym design or infrastructure assistance. We show that zk-PoDI satisfies all the requirements for a practical Sybil-resistance pseudonym system, and it has low latency, adjustable difficulty, moderate computation overhead, and negligible communication cost. We also discuss the future work of implementing and evaluating zk-PoDI in a realistic city-scale simulation environment.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (30)
  1. Iso. Information security, cybersecurity and privacy protection – evaluation criteria for IT security – part 2: Security functional components. Technical Report 15408-2, International Organization for Standardization, Geneva, Switzerland, 2022.
  2. ETSI. Intelligent transport systems (ITS); security; trust and privacy management; release 2. Technical Report TS 102-941, 2022.
  3. A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, 2010.
  4. John R Douceur. The sybil attack. In Peer-to-Peer Systems, pages 251–260. Springer Berlin Heidelberg, 2002.
  5. Zero-knowledge proof of traffic: A deterministic and privacy-preserving cross verification mechanism for cooperative perception data. IEEE Access, 11:142846–142861, December 2023.
  6. CanDID: Can-do decentralized identity with legacy compatibility, sybil-resistance, and accountability. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, May 2021.
  7. Decentralized and sybil-resistant pseudonym registration using social graphs. 2016 14th Annual Conference, 2016.
  8. Sybil-resistant pseudonymization and pseudonym change without trusted third parties. Proceedings of the 14th ACM Workshop, 2015.
  9. Trajectory as an identity: Privacy-preserving and sybil-resistant authentication for internet of vehicles. Security and Communication, 2021.
  10. Non-Interactive Privacy-Preserving Sybil-Free authentication scheme in VANETs. In Symposium on Vehicles Security and Privacy (VehicleSec) 2023. 27 February, 2023, San Diego, CA, USA. Internet Society, 2023.
  11. Ring signature-based conditional privacy-preserving authentication in VANETs. Wirel. Pers. Commun., 114(1):853–881, September 2020.
  12. An efficient conditional privacy-preserving authentication scheme for Vehicle-To-Infrastructure communication in VANETs. Vehicular Communications, 22:100228, April 2020.
  13. Detecting sybil attacks using proofs of work and location in VANETs. IEEE Trans. Dependable Secure Comput., 19(1):39–53, January 2022.
  14. Deterministic sybil attack exclusion in Cooperative-Intelligent transportation systems. https://d-nb.info/1199614092/34. Accessed: 2023-11-14.
  15. The knowledge complexity of interactive proof systems. SIAM J. Comput., 18(1):186–208, February 1989.
  16. Scaling up trustless dnn inference with zero-knowledge proofs, 2022.
  17. Zama: A zkp-based anonymous mutual authentication scheme for the iov. IEEE Internet of Things Journal, 9(22):22903–22913, 2022.
  18. Maximizing privacy and security of collaborative indoor positioning using zero-knowledge proofs. Internet of Things, 22:100801, 2023.
  19. Is it really easy to detect sybil attacks in C-ITS environments: A position paper. IEEE Trans. Intell. Transp. Syst., 23(10):18273–18287, October 2022.
  20. An introduction to Diophantine equations: A problem-based approach. Springer, 2010.
  21. Hilbert’s 10th problem. Scientific American, 229(5):84–91, 1973.
  22. Succinct {{\{{Non-Interactive}}\}} zero knowledge for a von neumann architecture. In 23rd USENIX Security Symposium (USENIX Security 14), pages 781–796, 2014.
  23. Noninteractive zero-knowledge. SIAM Journal on Computing, 20(6):1084–1118, 1991.
  24. Jens Groth. On the size of Pairing-Based non-interactive arguments. In Advances in Cryptology – EUROCRYPT 2016, pages 305–326. Springer Berlin Heidelberg, 2016.
  25. Quadratic span programs and succinct nizks without pcps. In Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings 32, pages 626–645. Springer, 2013.
  26. Peter L Montgomery. Modular multiplication without trial division. Math. Comput., 44(170):519–521, 1985.
  27. Yuri Matiyasevich. Hilbert’s tenth problem. MIT press, 1993.
  28. Finding numerical solutions of diophantine equations using ant colony optimization. Applied Mathematics and Computation, 219(24):11376–11387, 2013.
  29. SK Jeswal and S Chakraverty. Connectionist based models for solving diophantine equation. Journal of Interdisciplinary Mathematics, 23(4):825–841, 2020.
  30. Flowsim: A modular simulation platform for microscopic behavior analysis of City-Scale connected autonomous vehicles. In The 26th edition of the IEEE International Conference on Intelligent Transportation Systems (ITSC 2023), pages 1–8, Bilbao, Bizkaia, Spain, 2023.

Summary

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 2 tweets with 0 likes about this paper.