We introduce Zero-Knowledge Location Privacy (ZKLP), enabling users to prove to third parties that they are within a specified geographical region while not disclosing their exact location. ZKLP supports varying levels of granularity, allowing for customization depending on the use case. To realize ...
Imagine you want use Google Home to manage your home (questionable decision, but bare with me for a moment). Whenever you get near your house it should turn on your lights and starts up the heating so it's nice and toasty when you get home. In order to do this you need to constantly send your GPS data to Google so they can track when you get near your home. Even if your location data is slightly obfuscated (e.g. by rounding to nearest mile or some hexagonal grid) they still get a rough estimate of your location.
What this paper uses is a "thing" called SNARK. You can think of it (for this example) like a function that computes if you are near your house or not. You then execute that SNARK on your local device with your current exact GPS coordinates. The result of that operation is a signed result that is the proof if you are near your house or not, without actually telling where exactly you are. This proof can then be sent to Google without much fear of giving them any data they don't need. The privacy aspect is especially interesting whenever you are not nearby: it will just tell Google that you are not at home, they have absolutely no idea if you are at work, or in Australia, or on the Moon or wherever else.
I think the main thing they did in this paper is to define some operations on SNARKs that lets you compute proximity efficiently.
Wait, that's a dumb design. On a (way) older phone I had some automation running and all that location triggering was done on the phone and only connected to my home when I was in fact near it. Google (or any role party) shouldn't need to receive live geo location updates.
I think it is spoof-resistant from the sound of it? You giving a valid proof-of-region via one of their circuit designs provides proof of your region but does not give your exact location, from the sounds of it.
as per the first paragraph of the intro of the linked paper, it's safer to store this than it is an actual location. if data gets leaked it's like leaking a hashed password instead of a plaintext one. their example is device trackers.
just tesselate the world with hexagons and say you're in a specific one? that doesn't give precise proximity but does expose your general area.
this does the opposite, doesn't expose your general area but let's you determine if it is close to some other location via an expensive comparison. the precision of proximity isn't tied to how precise a location/small a hexagon you're exposing