Core Concepts
zk-PoDI enables vehicles to prove distinct identity without compromising privacy in C-ITS.
Abstract
I. Introduction
Importance of pseudonyms in C-ITS for privacy.
Sybil attacks due to pseudonym unlinkability.
II. Pseudonym Standards
Requirements for pseudonym design in C-ITS standards.
III. Sybil Attacks in C-ITS
Impact and vulnerabilities of Sybil attacks.
IV. Existing Solutions
Overview of existing sybil-resistant pseudonyms.
V. zk-PoDI Protocol
Proposal and implementation details of zk-PoDI.
VI. Performance Analysis
Evaluation of proof and verification time based on parameters Nx and Np.
VII. Threat Analysis & Difficulty Assessment
Addressing potential threats and difficulty analysis.
Stats
"Zk-PoDI satisfies all requirements for a practical Sybil-resistance pseudonym system."
"Proof generation time varies from 8 to 72 ms based on Nx and Np parameters."