The Phantom Tollbooth: Privacy-Preserving Toll Collection in the Presence of Driver Collusion
Sarah Meiklejohn (UC San Diego) Keaton Mowery (UC San Diego) Stephen Checkoway (UC San Diego) Hovav Shacham (UC San Diego)
1
The Phantom Tollbooth: Privacy-Preserving Toll Collection in the - - PowerPoint PPT Presentation
The Phantom Tollbooth: Privacy-Preserving Toll Collection in the Presence of Driver Collusion Sarah Meiklejohn (UC San Diego) Keaton Mowery (UC San Diego) Stephen Checkoway (UC San Diego) Hovav Shacham (UC San Diego) 1 Motivation: how tolling
1
2
2
2
2
2
2
3
3
3
3
3
3
4
4
USENIX Security 2009: VPriv [PBB]
4
USENIX Security 2009: VPriv [PBB]
4
USENIX Security 2009: VPriv [PBB]
4
USENIX Security 2009: VPriv [PBB]
4
USENIX Security 2009: VPriv [PBB]
USENIX Security 2010: PrETP [BRTPVG]
4
USENIX Security 2009: VPriv [PBB]
USENIX Security 2010: PrETP [BRTPVG]
5
5
5
5
5
5
5
5
5
5
5
5
5
6
6
6
6
6
6
7
7
7
7
7
7
7
7
7
7
7
7
7
8
8
8
8
8
8
8
8
8
9
9
9
9
9
9
9
9
9
9
9
9
9
10
11
11
11
11
11
11
11
11
11
11
11
11
12
12
12
12
12
12
12
12
12
12
12
13
13
13
13
13
13
13
13
13
13
13
13
13
13
14
14
14
14
14
14
14
14
14
14
14
14
14
15
16
16
16
16
16
17
17
Time (ms) Operation Laptop ARM Creating parameters 75.12 1083.61 Encryption 82.11 1187.82 Blind extraction (user) 13.13 214.06 Blind extraction (authority) 11.21 175.25 Decryption 78.31 1131.58
Table 1: The average time, in milliseconds and over a run
17
Time (ms) Operation Laptop ARM Creating parameters 75.12 1083.61 Encryption 82.11 1187.82 Blind extraction (user) 13.13 214.06 Blind extraction (authority) 11.21 175.25 Decryption 78.31 1131.58
Table 1: The average time, in milliseconds and over a run
17
Time (ms) Operation Laptop ARM Creating parameters 75.12 1083.61 Encryption 82.11 1187.82 Blind extraction (user) 13.13 214.06 Blind extraction (authority) 11.21 175.25 Decryption 78.31 1131.58
Table 1: The average time, in milliseconds and over a run
3: Size of each of the components that needs
17
Time (ms) Operation Laptop ARM Creating parameters 75.12 1083.61 Encryption 82.11 1187.82 Blind extraction (user) 13.13 214.06 Blind extraction (authority) 11.21 175.25 Decryption 78.31 1131.58
Table 1: The average time, in milliseconds and over a run
3: Size of each of the components that needs
17
Time (ms) Operation Laptop ARM Creating parameters 75.12 1083.61 Encryption 82.11 1187.82 Blind extraction (user) 13.13 214.06 Blind extraction (authority) 11.21 175.25 Decryption 78.31 1131.58
Table 1: The average time, in milliseconds and over a run
3: Size of each of the components that needs
17
Time (ms) Operation Laptop ARM Creating parameters 75.12 1083.61 Encryption 82.11 1187.82 Blind extraction (user) 13.13 214.06 Blind extraction (authority) 11.21 175.25 Decryption 78.31 1131.58
Table 1: The average time, in milliseconds and over a run
3: Size of each of the components that needs
18
19
19
19
19
19