Table of Contents
Fetching ...

Blockchain Based Zero-Knowledge Proof of Location in IoT

Wei Wu, Erwu Liu, Xinglin Gong, Rui Wang

TL;DR

This paper proposes a zero-knowledge proof of location (zk-PoL) protocol, which has excellent security to resist main attacks, the computational efficiency is independent of input parameters and the zk- PoL is appropriate to delay-tolerant LBSs.

Abstract

With the development of precise positioning technology, a growing number of location-based services (LBSs) facilitate people's life. Most LBSs require proof of location (PoL) to prove that the user satisfies the service requirement, which exposes the user's privacy. In this paper, we propose a zero-knowledge proof of location (zk-PoL) protocol to better protect the user's privacy. With the zk-PoL protocol, the user can choose necessary information to expose to the server, so that hierarchical privacy protection can be achieved. The evaluation shows that the zk-PoL has excellent security to resist main attacks, moreover the computational efficiency is independent of input parameters and the zk-PoL is appropriate to delay-tolerant LBSs.

Blockchain Based Zero-Knowledge Proof of Location in IoT

TL;DR

This paper proposes a zero-knowledge proof of location (zk-PoL) protocol, which has excellent security to resist main attacks, the computational efficiency is independent of input parameters and the zk- PoL is appropriate to delay-tolerant LBSs.

Abstract

With the development of precise positioning technology, a growing number of location-based services (LBSs) facilitate people's life. Most LBSs require proof of location (PoL) to prove that the user satisfies the service requirement, which exposes the user's privacy. In this paper, we propose a zero-knowledge proof of location (zk-PoL) protocol to better protect the user's privacy. With the zk-PoL protocol, the user can choose necessary information to expose to the server, so that hierarchical privacy protection can be achieved. The evaluation shows that the zk-PoL has excellent security to resist main attacks, moreover the computational efficiency is independent of input parameters and the zk-PoL is appropriate to delay-tolerant LBSs.

Paper Structure

This paper contains 19 sections, 30 equations, 6 figures, 1 table.

Figures (6)

  • Figure 1: Structure of A Simplified Block Chain
  • Figure 2: Schematic Diagram of Bilinear Map
  • Figure 3: System Model of zk-PoL
  • Figure 4: Process Diagram of zk-PoL
  • Figure 5: Distribution of Average Execution Time
  • ...and 1 more figures