Skip to main content

A Decentralized and Anonymous Data Transaction Scheme Based on Blockchain and Zero-Knowledge Proof in Vehicle Networking (Workshop Paper)

  • Conference paper
  • First Online:
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2019)

Abstract

Data transaction in internet of vehicles is a transaction occurs between vehicle owner and data buyer. Blockchain is a new technology that brings decentralized ledger system for user, which means users could make payment without the third party. There are several projects combined internet of vehicles and Blockchain, however, none of them realize a trustworthy anonymous data transaction. In this paper, we first propose the concept of Super Nodes to guarantee data authenticity, then we construct the anonymity for the transaction base on zero-knowledge Succinct Non-interactive Argument of knowledge (zk-SNARKs) and DAP from Zerocash. Moreover, a smart contract is deployed for mutual benefits. Simulation experiment shows this scheme is practical.

Supported by the construct program of applied characteristic discipline in Hunan University of Science and Engineering.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Negligible function.

  2. 2.

    \( {\text{PRF}}\left( {} \right) \) is a pseudorandom function.

  3. 3.

    \( {\text{COMM}}\left( {} \right) \) is a statistically-hiding non-interactive commitment scheme, which satisfy the verifiability: given \( c{\text{ := COMM}}_{r} \left( s \right) \), one who knows r and s can verify that \( {\text{COMM}}_{r} \left( s \right) \) is equal to \( c \).

References

  1. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)

    Google Scholar 

  2. Buterin, V.: A next-generation smart contract and decentralized application platform. white paper (2014)

    Google Scholar 

  3. CarBlock: A global transportation data protocol with decentralized applications. white paper (2018)

    Google Scholar 

  4. Sasson, E.B., Chiesa, A., Garman, C., et al.: Zerocash: decentralized anonymous payments from bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 459–474. IEEE (2014)

    Google Scholar 

  5. Castro, M., Liskov, B.: Practical Byzantine fault tolerance. OSDI, vol. 99 (1999)

    Google Scholar 

  6. https://bitcointalk.org/index.php?topic=193281.msg2224949#msg2224949

  7. Parno, B., Howell, J., Gentry, C., et al.: Pinocchio: nearly practical verifiable computation. In: 2013 IEEE Symposium on Security and Privacy, pp. 238–252. IEEE (2013)

    Google Scholar 

  8. Ben-Sasson, E., Chiesa, A., Tromer, E., et al.: Succinct non-interactive zero knowledge for a von Neumann architecture. In: 23rd USENIX Security Symposium (USENIX Security 14), pp. 781–796 (2014)

    Google Scholar 

  9. Gennaro, R., Gentry, C., Parno, B., Raykova, M.: Quadratic span programs and succinct NIZKs without PCPs. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 626–645. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38348-9_37

    Chapter  Google Scholar 

  10. Parno, B., Raykova, M., Vaikuntanathan, V.: How to delegate and verify in public: verifiable computation from attribute-based encryption. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 422–439. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-28914-9_24

    Chapter  Google Scholar 

  11. Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key encryption. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 566–582. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45682-1_33

    Chapter  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Ou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ou, W., Deng, M., Luo, E. (2019). A Decentralized and Anonymous Data Transaction Scheme Based on Blockchain and Zero-Knowledge Proof in Vehicle Networking (Workshop Paper). In: Wang, X., Gao, H., Iqbal, M., Min, G. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 292. Springer, Cham. https://doi.org/10.1007/978-3-030-30146-0_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30146-0_48

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30145-3

  • Online ISBN: 978-3-030-30146-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics