1,385 results on '"Group signature"'
Search Results
102. SAES: A self-checking authentication scheme with higher efficiency and security for VANET.
- Author
-
Jiang, Haobin, Hua, Lei, and Wahab, Lukuman
- Subjects
VEHICULAR ad hoc networks ,DATA privacy ,INFORMATION technology security - Abstract
Vehicular Ad Hoc Network (VANET), a wireless network for V2X communication, provides a new opportunity to create a safer, comfortable and efficient traffic environment. However, the large scale and open environment of VANET brings many problems and challenges to information security, especially the vehicular authentication problem. Many existing authentication schemes always used complex cryptographic algorithms in the process of vehicular authentication to avoid the leak of users' privacy information. Nevertheless, these schemes are unsuitable for VANET due to its higher computational overhead, because VANET's environments are characterized by short communication time between the vehicles and the Road-Side Units (RSUs). Therefore, efficiency and security should be fully considered during the process of vehicular authentication. This paper proposed A Self-checking Authentication Scheme with Higher Efficiency and Security for VANET, named SAES. The proposed scheme adopts self-checking authentication based on pseudonym instead of traditional authentication with the Trusted Authority (TA) participating in the authentication process to minimize the authentication cost. Meanwhile, the group signature is used to reduce the frequency of authentication for legitimate vehicles. The security and performance results of the proposed scheme, analyzed by the provable security and simulation, indicate that this scheme not only meets the requirements of security for VANET but also has a better performance in comparison with existing schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
103. SEMA: Secure and Efficient Message Authentication Protocol for VANETs.
- Author
-
Wang, Peng and Liu, Yining
- Abstract
Message authentication and conditional privacy preservation are two critical security issues in vehicular ad hoc networks (VANETs), which have been extensively studied in recent years. To achieve these security issues, many information security technologies have been proposed so far. Among them, pseudonyms-based and group-based messages signing and verifying are two of the main methods adopted in recently published literature. However, analysis points out that both of the two technologies have their downsides. To address these issues, a secure and efficient message authentication protocol (SEMA) is proposed in this article, which aims to achieve mutual authentication among vehicles and road-side units (RSUs) in VANETs by combining the advantages of pseudonyms-based and group-based methods. Security analysis shows that SEMA is robust to various security attacks. Performance evaluation demonstrates that SEMA is computationally lightweight on both vehicles and RSUs. Finally, simulations are performed to prove the feasibility in highway and urban environment. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
104. An Anonymous Authentication Scheme with Controllable Linkability for Vehicle Sensor Networks.
- Author
-
Yousheng Zhou, Lvjun Chen, Xiaofeng Zhao, and Zheng Yang
- Subjects
SENSOR networks ,SMART cities ,DATA mining ,WIRELESS communications ,VEHICLES - Abstract
Vehicle sensor networks (VSN) play an increasingly important part in smart city, due to the interconnectivity of the infrastructure. However similar to other wireless communications, vehicle sensor networks are susceptible to a broad range of attacks. In addition to ensuring security for both data-at-rest and data-in-transit, it is essential to preserve the privacy of data and users in vehicle sensor networks. Many existing authentication schemes for vehicle sensor networks are generally not designed to also preserve the privacy between the user and service provider (e.g., mining user data to provide personalized services without infringing on user privacy). Controllable linkability can be used to facilitate an involved entity with the right linking key to determine whether two messages were generated by the same sender, while preserving the anonymity of the signer. Such a functionality is very useful to provide personalized services. Thus, in this paper, a threshold authentication scheme with anonymity and controllable linkability for vehicle sensor networks is constructed, and its security is analyzed under the random oracle model. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
105. Securing Anonymous Authenticated Announcement Protocol for Group Signature in Internet of Vehicles.
- Author
-
Amir, Nur Afiqah Suzelan, Malip, Amizah, and Wan Ainun Mior Othman
- Subjects
INTERNET protocols ,TRAFFIC congestion ,INTERNET ,5G networks - Abstract
Announcement protocol in Internet of Vehicles (IoV) is an intelligent application to enhance public safety, alleviate traffic jams and improve transportation quality. It requires communication between vehicles, roadside units and pedestrian to disseminate safety-related messages. However, as vehicles connected to internet, it makes them accessible globally to a potential adversary. Safety-related application requires a message to be reliable, however it may intrude the privacy of a vehicle. Contrarily, if some misbehaviour emerges, the malicious vehicles must be able to traceable and revoke from the network. This is a contradiction between privacy and accountability since the privacy of a user should be preserved. For a secure communication among intelligent entities, we propose a novel announcement protocol in IoV using group signature. To the best of our knowledge, our work is the first comprehensive construction of an announcement protocol in IoV that deploys group signature. We show that our protocol efficiently solves these conflicting security requirements of message reliability, privacy and accountability using 5G communication channel. The performance analysis and simulation results signify our work achieves performance efficiency in IoV communication. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
106. Secure Data Travelling User using Hybrid Cryptosystem with User Privacy Protection
- Author
-
Anindya Dwi Putri Islamidina, Amang Sudarsono, and Titon Dutono
- Subjects
GPS ,AES ,IB-mRSA ,Group Signature ,Engineering (General). Civil engineering (General) ,TA1-2040 - Abstract
Nowadays traveling is the activity that everyone likes the most, but sometimes there is one traveling member who is lost and confused looking for the location of the other members. When traveling, they must bring a smartphone because of its small size and easy to carry anywhere. For this reason, an Android-based smartphone application that is able to send GPS data to all travelling members is proposed. In order to secure data transmission, cryptography and group signature to ensure that only traveling members could find out the location are applied. We use hybrid cryptography, which is a combination of symmetric cryptography using AES and asymmetric cryptography using IB-mRSA. We also add group signature as verification that members are in the same traveling group. The test result showed that the proposed method is safer than the comparison method because the symmetric key is encrypted before the key is distributed, so the attacker can not know the key. The total processing time needed to send data until member get data is 2.01 s.
- Published
- 2020
- Full Text
- View/download PDF
107. Privacy Preserved Mobile Sensing Using Region-Based Group Signature
- Author
-
Ya-Cheng Li and Shin-Ming Cheng
- Subjects
Anonymity ,group signature ,location privacy ,mobile sensing ,rekeying ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Mobile sensing receives lots of attention since it exploits sensors embedded in smartphones to gather information for quality improvement of daily life. In particular, mobile users (MUs) carrying smartphones act as queriers who request information provided by MUs who act as data collectors, and the data collection and delivery are facilitated by human mobility and ubiquity. However, additional privacy considerations rise in this paradigm, where MUs might not want to reveal their identities when providing some information at a specific position during a particular period. By adopting group signature, where any member of its group can sign a message on behalf of the entire group, the signer of the sensed information cannot be recognized, and thus, anonymity is preserved. The concept of group signature can be realized when introducing mobile edge computing, where base stations are clustered into a region to serve a group of MUs. In such region-based group signature, MUs located in the same region are grouped and thus are indistinguishable. Due to the localized movement feature of human, MUs might not frequently leave the current group and join a new group, which subsequently reduces the infamous rekeying overhead. We implement group signature on Android smartphones and conduct simulation experiments to investigate the performance of the proposed region-based grouping approach from the perspectives of rekeying overhead and delay. The simulation results show that the region-based grouping method is efficient. Moreover, the optimal group number for the minimization of rekeying overhead is suggested.
- Published
- 2018
- Full Text
- View/download PDF
108. SRCPR: SignReCrypting Proxy Re-Signature in Secure VANET Groups
- Author
-
Sneha Kanchan and Narendra S. Chaudhari
- Subjects
AVISPA ,dynamic accumulator ,group signature ,proxy re-encryption ,proxy re-signature ,signcryption ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Vehicular Ad hoc Network is an emerging area as a key component of the intelligent transport system. Despite the immense researches going on in this area, it is yet to be deployed at its full scale due to lack of trust, safety, and confidentiality in the network. Moreover, the security algorithms proposed till now are complex, and calculations involved are difficult to be completed within the strict real-time constraints. This paper introduces the SignReCrypting Proxy Re-signature scheme, which reduces the time taken for encryption at sender side as well as for decryption at receiver side. Signcryption reduces the computation cost by converting two steps of signature and encryption into one, whereas re-encryption and re-signature enable Alice to decrypt and sign a message on behalf of Bob. These three terminologies altogether with group signature make the proposed algorithm robust, secure, and efficient. The compromised vehicle is revoked from group using dynamic accumulators, and security is verified using automated validation of Internet security protocols and applications.
- Published
- 2018
- Full Text
- View/download PDF
109. 基于中国剩余定理的前向安全群签名方案.
- Author
-
洪 璇 and 张绪霞
- Subjects
- *
CHINESE remainder theorem , *ANONYMITY - Abstract
In the group signature,a member can sign the message instead of the group. The verifier can verify the group signature, meanwhile it will not know the identity of the signer. This paper proposed a forward security group signature scheme based on the Chinese remainder theorem. The proposed scheme would dynamically add and delete the group members without modifying the group public key. The scheme had forward security probability, because the attackers couldn' t achieve the keys in other periods even if they corrupted the keys in a certain period. M eanwhile, the proposed scheme achieves these security properties, including anonymity, revocability, anti-forgery, and traceability. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
110. Group Signature Based Ethereum Transaction.
- Author
-
Muchtadi-Alamsyah, Intan, Imdad, Muhammad Thufaili, and Sutikno, Sarwono
- Subjects
- *
ELLIPTIC curve cryptography , *MONEY laundering , *TRANSACTION systems (Computer systems) , *CRYPTOCURRENCIES , *RESEARCH implementation - Abstract
In this study, anonymity related to the cryptographic scheme is specified, especially the design of anonymous schemes limited to blockchain caused by the implementation of group signatures. In general, the output of this research is the implementation of group signature scheme based on elliptic curve cryptography on blockchain Ethereum. The resulting software aims to address money laundering using cryptocurrency particularly Ethereum. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
111. Blockchain-based accountability for multi-party oblivious RAM.
- Author
-
Cao, Huikang, Li, Ruixuan, Tian, Wenlong, Xu, Zhiyong, and Xiao, Weijun
- Subjects
- *
DATA integrity , *CLOUD storage , *DATA protection - Abstract
Recently, oblivious random access machine (ORAM) has been widely used to prevent privacy leakage from user's access pattern. However, in multi-user scenarios, the obliviousness property of ORAM facilitates the malicious data modification by unauthorized users, which brings a new security challenge of user accountability to ORAM applications. Moreover, based on our observations, existing user accountability schemes for multi-user ORAM induce the extremely unacceptable overhead in both time and storage. What is worse, it is still inherent the traditional cloud accountability problem that the untrusted cloud server may have misbehavior on storing the outsourced data. In this paper, we focus on the issue that how to do accountability for both malicious users and untrusted cloud server without the independent trusted third party server. To address the above problem, we design and implement a Traceable Oblivious RAM, or T-ORAM for short, a cryptographic system that protects the privacy of users and the integrity of outsourced data based on group signatures. It can detect malicious users quickly by utilizing the traceability property of group signatures, and cost less storage overhead comparing with the existing solutions. Then, we further propose a more secure solution of Blockchain-based Traceable Oblivious RAM (BT-ORAM). Specifically, by introducing the blockchain technology, BT-ORAM can detect the malicious behavior from both malicious users and untrusted cloud server. BT-ORAM is the first accountability work for multi-user ORAM that deal with both malicious users and the untrusted cloud server. Finally, security analysis and experimental results show that our method outperforms the state-of-the-art accountability work for oblivious RAM, S-GORAM, in both security and performance. • We summarize the two critical problems in data integrity protection by applying ORAM technology into the cloud storage. • We present a Traceable Oblivious RAM (T-ORAM) with malicious user accountability for multi-user ORAM. • To achieve a high-level secure ORAM system, we further propose a Blockchain-based Traceable Oblivious RAM (BT-ORAM) with a comprehensive accountability scheme. • Experimental results show that T-ORAM has a better performance than existing related solutions, and BT-ORAM can achieve a higher level security than previous work. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
112. Quantum (t, n) threshold group signature based on Bell state.
- Author
-
Qin, Huawang, Tang, Wallace K. S., and Tso, Raylin
- Subjects
- *
QUANTUM groups , *BELLS , *QUANTUM cryptography , *ARBITRATORS - Abstract
Quantum group signature is an important branch of quantum signature. Most of the existing quantum group signature schemes require that all the signatories must be present to generate a valid signature, and this property may limit their application in practice. In this paper, we will propose a quantum (t, n) threshold group signature scheme. In our scheme, n signatories compose a group, and any t out of these n signatories can generate a valid signature on behalf of the group. The t signatories use the quantum-controlled-not operations to expand the quantum message into t-particle entangled states, and then use the entanglement swapping to transmit the quantum message to the receiver. The receiver performs the single-particle measurements and unitary operations to recover the initial quantum message, and then verifies the signature with the help of the arbitrator. Compared to the existing quantum group signature schemes, our (t, n) threshold scheme will be more flexible in practice. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
113. Revocation Protocol for Group Signatures in VANETs: A Secure Construction.
- Author
-
Mohd Shari, Nur Fadhilah, Malip, Amizah, and Mior Othman, Wan Ainun
- Subjects
VEHICULAR ad hoc networks ,REVOCATION ,WIRELESS communications ,AUTOMOBILE driving simulators ,SCALABILITY ,CONSTRUCTION ,NETWORK routing protocols - Abstract
Vehicular ad hoc networks (VANETs) enable wireless communication between vehicles and roadside infrastructure to provide a safer and more efficient driving environment. However, due to VANETs wireless nature, vehicles are exposed to several security attacks when they join the network. In order to protect VANETs against misbehaviours, one of the vital security requirements is to revoke the misbehaved vehicles from the network. Some existing revocation protocols have been proposed to enhance security in VANETs. However, most of the protocols do not efficiently address revocation issues associated with group signature-based schemes. In this paper, we address the problem by constructing a revocation protocol particularly for group signatures in VANETs. We show that this protocol can be securely and efficiently solve the issue of revocation in group signature schemes. The theoretical analysis and simulation results demonstrate our work is secure against adversaries and achieves performance efficiency and scalability. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
114. EASPSC: Efficient authentication of SignRecryption protocol using shareable clouds in VANET groups.
- Author
-
Kanchan, Sneha, Singh, Garima, and Chaudhari, Narendra S.
- Subjects
INTERNET protocols ,TRAFFIC accidents ,INTERNET security ,FACILITATED communication - Abstract
Vehicular ad hoc networks (VANET) is one of the most awaited and ambitious projects of Intelligent Transport System (ITS), where vehicles are permitted to talk with each other. The ultimate goal of the network is to develop a connected network of automobiles, and eventually to reduce traffic and accidents. However, VANET is an ad hoc network without any infrastructure. Apart from architectural issues, there are plenty of security and performance issues, which makes it difficult to be implemented. Therefore, we are using fully authenticated Signcryption technique along with re-cryptography and shareable cloud to make the network safe, reliable and robust. Signcryption combines signature and encryption in a single step, hence decreasing the number of computations. Re-cryptography allows alternative authorities to take charge of the primary authority while maintaining communication transparency. Group signature facilitates secure communication within the group. Security has been verified using Burrows-Abadi-Needham (BAN) logic and Automated Validation of Internet Security Protocols and Applications (AVISPA). [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
115. Towards Lightweight Anonymous Entity Authentication for IoT Applications
- Author
-
Yang, Yanjiang, Cai, Haibin, Wei, Zhuo, Lu, Haibing, Choo, Kim-Kwang Raymond, Liu, Joseph K., editor, and Steinfeld, Ron, editor
- Published
- 2016
- Full Text
- View/download PDF
116. A Light-Weight Group Signature Scheme with Time-Token Dependent Linking
- Author
-
Emura, Keita, Hayashi, Takuya, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Güneysu, Tim, editor, Leander, Gregor, editor, and Moradi, Amir, editor
- Published
- 2016
- Full Text
- View/download PDF
117. A Practical Group Signature Scheme Based on Rank Metric
- Author
-
Alamélou, Quentin, Blazy, Olivier, Cauchie, Stéphane, Gaborit, Philippe, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Duquesne, Sylvain, editor, and Petkova-Nikova, Svetla, editor
- Published
- 2016
- Full Text
- View/download PDF
118. On the Security of a Threshold Anonymous Authentication Protocol for VANETs
- Author
-
Zhang, Jianhong, Sun, Zhibin, Liu, Shuai, Liu, Pengyan, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Wang, Guojun, editor, Ray, Indrakshi, editor, Alcaraz Calero, Jose M., editor, and Thampi, Sabu M., editor
- Published
- 2016
- Full Text
- View/download PDF
119. Group Signature with Deniability: How to Disavow a Signature
- Author
-
Ishida, Ai, Emura, Keita, Hanaoka, Goichiro, Sakai, Yusuke, Tanaka, Keisuke, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Foresti, Sara, editor, and Persiano, Giuseppe, editor
- Published
- 2016
- Full Text
- View/download PDF
120. Multi-device Anonymous Authentication
- Author
-
Kluczniak, Kamil, Wang, Jianfeng, Chen, Xiaofeng, Kutyłowski, Mirosław, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Chen, Jiageng, editor, Piuri, Vincenzo, editor, Su, Chunhua, editor, and Yung, Moti, editor
- Published
- 2016
- Full Text
- View/download PDF
121. A distributed cross-chain mechanism based on notary schemes and group signatures.
- Author
-
Wu, Xiaohua, Zhang, Tingbo, Wang, Jing, Cheng, Jun, and Wang, Zirui
- Subjects
NOTARIES ,BLOCKCHAINS - Abstract
Blockchain technology has attracted significant attention since its publication. However, most existing blockchain platforms are isolated systems, which makes it difficult to exchange data among different blockchains. The industry has proposed the notary schemes to enhance blockchain interoperability, which can exchange messages among different blockchains through a notary. However, conventional notary schemes are centralized, which suffers from single point of failures. To address these issues, this paper proposes a distributed cross-chain notary model with regulatory mechanisms, based on improved threshold group signatures. We improve the group signature scheme by setting up a group of tracing authorities to achieve distributed tracing. Furthermore, we incorporate this signature scheme into our notary scheme, where a group of notaries signs cross-chain transactions using group signatures. We also introduce a group of regulators to reveal the true identities of malicious notaries when disputes occur. Finally, we prove the security of our signature scheme based on the Random Oracle Model. In our experiments, when the number of notaries is 102 and the threshold is 2/3 of that, it takes 166 ms to set up and generate signature. Also, it takes 161 ms for regulators to reveal the true identities of malicious notaries. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
122. Blockchain-Based Secure Data Storage Protocol for Sensors in the Industrial Internet of Things
- Author
-
Pandi Vijayakumar, Jian Shen, Brij B. Gupta, and Junqing Lu
- Subjects
Smart contract ,business.industry ,Computer science ,Cloud computing ,Group signature ,Encryption ,Computer Science Applications ,Data sharing ,Control and Systems Engineering ,Computer data storage ,Overhead (computing) ,Electrical and Electronic Engineering ,business ,Cloud storage ,Information Systems ,Computer network - Abstract
The Industrial Internet of Things (IIoT) which introduces Internet of Things (IoT) technology into industrial environments is beneficial to construct smart factories. It utilizes various sensors to collect the data of industrial devices. Those data will be analysed to improve manufacturing efficiency and product quality. Cloud storage provides a solution for storing data outsourced, especially for sensors that have limited local storage and computational capacity. To ensure the privacy preserving of devices, the collected data should be stored in the formal of ciphertext. Therefore, encrypted data sharing should be implemented to analyse the devices data. In this paper, the cloud storage solution for sensors is considered. To achieve secure and efficient data storage and sharing, a novel group signature scheme, which has less computation overhead and communication overhead, is designed to realize anonymous authentication firstly. And then, a novel blockchain-based cloud storage protocol for sensors in IIoT is constructed on basis of the proposed group signature scheme. Smart contract and proxy re-encryption are utilized in this protocol to realize secure data sharing with less computational overhead. Furthermore, security proofs and performance evaluations demonstrate that this protocol is secure, privacy-preserving, and has at least 40% and 20% performance improvement in data storage and sharing phase, respectively.
- Published
- 2022
123. Publicly Verifiable Shared Dynamic Electronic Health Record Databases With Functional Commitment Supporting Privacy-Preserving Integrity Auditing
- Author
-
Ye Su, Jiankun Hu, Jing Qin, and Jiameng Sun
- Subjects
Scheme (programming language) ,Correctness ,Computer Networks and Communications ,Computer science ,Cloud computing ,02 engineering and technology ,computer.software_genre ,0202 electrical engineering, electronic engineering, information engineering ,Overhead (computing) ,computer.programming_language ,Revocation ,Database ,business.industry ,05 social sciences ,050301 education ,Group signature ,Computer Science Applications ,Hardware and Architecture ,020201 artificial intelligence & image processing ,Verifiable secret sharing ,business ,0503 education ,Cloud storage ,computer ,Software ,Information Systems - Abstract
The advent of electronic health record (EHR) system has greatly promoted the development of medical services, and its security and privacy are emerging as major concerns. The verifiable database (VDB), where a user outsources his large database to a cloud server and makes queries once he needs certain data, is proposed as an efficient updatable cloud storage model for resource-constrained users. The security goals of VDB include both the data storage integrity and the query result correctness. To improve system efficiency, most existing VDB schemes utilize proof reuse and the technique of proof updating to prove correctness of the query results. However, it ignores the "real-time" of proof generation, which results in an overhead that the user has to perform extra process (e.g. auditing schemes) to check storage integrity. In this paper, we propose a publicly verifiable updatable EHR database scheme that supports privacy-preserving and batch integrity auditing. We modify the existing functional commitment (FC) scheme for the VDB design and construct a concrete FC under the computational l-BDHE assumption. In addition, the use of an efficient verifier-local revocation group signature scheme makes our scheme support dynamic group member operations, and gives nice features, such as traceability and non-frameability.
- Published
- 2022
124. Healthchain: A Privacy Protection System for Medical Data Based on Blockchain
- Author
-
Baocheng Wang and Zetao Li
- Subjects
blockchain ,e-health ,encryption ,group signature ,privacy protection ,Information technology ,T58.5-58.64 - Abstract
Recently, with the great development of e-health, more and more countries have made certain achievements in the field of electronic medical treatment. The digitization of medical equipment and the structuralization of electronic medical records are the general trends. While bringing convenience to people, the explosive growth of medical data will further promote the value of mining medical data. Obviously, finding out how to safely store such a large amount of data is a problem that urgently needs to be solved. Additionally, the particularity of medical data makes it necessarily subject to great privacy protection needs. This reinforces the importance of designing a safe solution to ensure data privacy. Many existing schemes are based on single-server architecture, which have some natural defects (such as single-point faults). Although blockchain can help solve such problems, there are still some deficiencies in privacy protection. To solve these problems, this paper designs a medical data privacy protection system, which integrates blockchain, group signature, and asymmetric encryption to realize reliable medical data sharing between medical institutions and protect the data privacy of patients. This paper proves theoretically that it meets our security and privacy requirements, and proves its practicability through system implementation.
- Published
- 2021
- Full Text
- View/download PDF
125. Cryptanalysis of an Anonymous and Traceable Group Data Sharing in Cloud Computing.
- Author
-
Lin, Xi-Jun, Sun, Lin, and Qu, Haipeng
- Abstract
In cloud environments, group data sharing has become a hot topic in recent years. How to share data securely and efficiently in cloud environments is an urgent problem to be solved. Recently, an anonymous and traceable group data sharing scheme was proposed by Shen et al. to address this issue. They constructed their scheme using a group signature scheme as the building block. In this comment, we discuss the security of their group signature scheme and point out that it does not achieve the anonymity which they claimed and give a corresponding attack. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
126. The Dynamic Group Authentication Scheme for P2P Based Mobile Commerce
- Author
-
Yun, Sunghyun, Lim, Heuiseok, Park, James J. (Jong Hyuk), editor, Stojmenovic, Ivan, editor, Jeong, Hwa Young, editor, and Yi, Gangman, editor
- Published
- 2015
- Full Text
- View/download PDF
127. Group Signatures in Practice
- Author
-
Martínez, V. Gayoso, Encinas, L. Hernández, Song, Seok-Zun, Kacprzyk, Janusz, Series editor, Herrero, Álvaro, editor, Baruque, Bruno, editor, Sedano, Javier, editor, Quintián, Héctor, editor, and Corchado, Emilio, editor
- Published
- 2015
- Full Text
- View/download PDF
128. Simpler Efficient Group Signatures from Lattices
- Author
-
Nguyen, Phong Q., Zhang, Jiang, Zhang, Zhenfeng, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, and Katz, Jonathan, editor
- Published
- 2015
- Full Text
- View/download PDF
129. Group Signature Based Trace Hiding in Web Query
- Author
-
Xu, Jin, Yao, Lan, Gao, Fuxiang, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Wang, Yu, editor, Xiong, Hui, editor, Argamon, Shlomo, editor, Li, XiangYang, editor, and Li, JianZhong, editor
- Published
- 2015
- Full Text
- View/download PDF
130. Elliptic curves differentiation with application to group signature scheme
- Author
-
Alin Ionut Golumbeanu and Oana Adriana Ticleanu
- Subjects
Group signature ,zero knowledge ,discrete logarithm ,Schnorr signature ,Mathematics ,QA1-939 - Abstract
Starting with the presented concept by Chaum and van Heijst and its refers to digitally signing for a document by a group member, such signatures allows the signers to remains anonymous but any verifier can confirm that the signer is a group member. The signatory anonymity can be revealed only by a designated group authority that has some auxiliary information. We present a complexity efficient group signature scheme based on zero knowledge and Schnorr signature algorithm. The scheme has two phases: the first one demonstrates that the signer is a member of the group while the second generates the message signature. In the end, we modify the classic scheme using differential elliptic curve cryptography to increase the system's performance against differential attacks.
- Published
- 2017
131. Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature
- Author
-
Wei Feng, Zheng Yan, and Haomeng Xie
- Subjects
Privacy ,trust ,group signature ,social networking ,anonymous authentication ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Pervasive social networking (PSN) supports instant social activities anywhere and at any time with the support of heterogeneous networks, where privacy preservation is a crucial issue. One of the effective methods to achieve privacy preservation is anonymous authentication on trust. However, few literatures pay attention to it. In this paper, we propose an anonymous authentication scheme based on group signature for authenticating trust levels rather than identities of nodes in order to avoid privacy leakage and guarantee secure communications in PSN. The scheme achieves secure anonymous authentication with anonymity and conditional traceability with the support of a trusted authority (TA). We also provide a mechanism to guarantee communications among nodes when TA is not available for some nodes. In addition, the utilization of batch signature verification further improves the efficiency of authenticity verification on a large number of messages. Performance analysis and evaluation further prove that the proposed scheme is effective with regard to privacy preservation, computation complexity, communication cost, flexibility, reliability, and scalability.
- Published
- 2017
- Full Text
- View/download PDF
132. An authenticated encrypted routing protocol against attacks in mobile ad-hoc networks
- Author
-
C.C. Suma, H.L. Gururaj, and B. Ramesh
- Subjects
Anonymity ,Authenticated routing ,Mobile-ad-hoc networks(MANETs) ,Group signature ,Electronic computers. Computer science ,QA75.5-76.95 ,Social sciences (General) ,H1-99 - Abstract
Mobile Ad hoc Network is stated as a cluster that contains Digital data terminals and they are furnished with the wireless transceivers which are able to communicate with each other with no need of any fixed architecture or concentrated authority. Security is one of the major issues in MANETs because of vast applications such as Military Battlefields, emergency and rescue operations[10]. In order to provide anonymous communications and to identify the malicious nodes in MANETs, many authors have proposed different secure routing protocols but each protocol have their own advantages and disadvantages. In MANTE’s each and every node in the communicating network functions like router and transmits the packets among the networking nodes for the purpose of communication[11]. Sometimes nodes may be attacked by the malicious nodes or the legitimate node will be caught by foemen there by controlling and preventing the nodes to perform the assigned task or nodes may be corrupted due to loss of energy. So, due to these drawbacks securing the network under the presence of adversaries is an important thing. The existing protocols were designed with keeping anonymity and the identification of vicious nodes in the network as the main goal. For providing better security, the anonymity factors such as Unidentifiability and Unlinkability must be fully satisfied[1]. Many anonymous routing schemes that concentrate on achieving anonymity are proposed in the past decade and they provides the security at different levels and also provides the privacy protection that is of different cost. In this paper we consider a protocol called Authenticated Secure Routing Protocol proposed which provides both security & anonymity. Anonymity is achieved in this protocol using Group signature. Over all by using this protocol performance in terms of throughput as well as the packet dropping rate is good compared to the other living protocols.
- Published
- 2017
133. Energy-Efficient and Secure Communication Toward UAV Networks
- Author
-
Teng Li, Mohammad S. Obaidat, Jiawei Zhang, Yulong Shen, Lin Yangxu, Jianfeng Ma, and Chi Lin
- Subjects
Computer Networks and Communications ,Wireless network ,business.industry ,Computer science ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Group signature ,Merkle tree ,Encryption ,Computer Science Applications ,Secure communication ,Hardware and Architecture ,Signal Processing ,Key (cryptography) ,business ,Key management ,Secure transmission ,Information Systems ,Computer network - Abstract
Wireless networks ensure the Unmanned Aerial Vehicles (UAVs) communicate and cooperate with each other, which plays an indispensable role among UAVs. The two crucial challenges in UAV wireless networks are energy saving and security. The current light-weight communication approaches lead to insufficient robustness of the encrypted transmission that is insecure. To address this issue, we propose a secure transmission approach with energy-efficiency towards UAVs networks. We design a light-weight symmetric encryption algorithm based on SM4 and the relevant key negotiation and update mechanism to protect the confidentiality of communication contents. Moreover, a modified aggregative BLS signature scheme, together with Merkle Hash Tree (MHT) is introduced to guarantee the integrity and authenticity of data packets in transmission. Furthermore, we propose an online/offline revocable identity-based group signature (OORIBGS) scheme and integrate it into our framework for UAV anonymity, traceability as well as revocability with small key management cost and high efficiency. We give detailed security analysis and prove that our proposal has the properties of data confidentiality, integrity and authenticity as well as identity traceability and anonymity. Moreover, we apply our approach in the UAVs networks and evaluate the runtime and anti-attack performance. The experimental results show that the proposed method can be effectively used in UAVs secure communication.
- Published
- 2022
134. PBTM: A Privacy-Preserving Announcement Protocol With Blockchain-Based Trust Management for IoV
- Author
-
Haiyang Yu, Pengcheng Wang, Yunpeng Wang, and Yanan Zhao
- Subjects
Security analysis ,Computer Networks and Communications ,Computer science ,business.industry ,Group signature ,Computer security ,computer.software_genre ,Computer Science Applications ,Control and Systems Engineering ,Proof-of-work system ,Synchronization (computer science) ,Trust management (information system) ,The Internet ,Electrical and Electronic Engineering ,business ,Byzantine fault tolerance ,computer ,Information Systems ,Anonymity - Abstract
As a promising technology, the Internet of Vehicle (IoV) enables vehicles connected to the network and sends announcements to roadside units (RSUs) or other vehicles. Nevertheless, because of the open nature of IoV, trust and privacy are confronted with challenges from cyber attacks. Motivated by addressing the above-mentioned problems, a privacy-preserve announcement protocol is constructed in this article, in which an identity-based group signature is used to achieve anonymity of vehicles. In addition, a novel blockchain-based trust management system is designed to guarantee the authenticity of the transmitted messages while realizing the message synchronization. In the meanwhile, a joint proof of work and improved practical Byzantine fault tolerance consensus mechanism is adopted in our scheme to enhance the efficiency of verification. Security analysis as well as simulation results indicate that our proposal is suitable and effective for IoV environment.
- Published
- 2022
135. A Privacy-Preserving Key Management Scheme with Support for Sybil Attack Detection in VANETs
- Author
-
L. Ellen Funderburg and Im-Yeong Lee
- Subjects
VANET ,group signature ,key management ,Sybil attack ,privacy ,backward secrecy ,Chemical technology ,TP1-1185 - Abstract
Vehicular ad hoc networks (VANETs) face two important and conflicting challenges with regards to security: preserve the privacy of vehicles in order to prevent malicious entities from tracking users and detect and remove bad actors that attempt to game the system for their own advantage. In particular, detecting Sybil attacks, in which one node attempts to appear as many, seemingly conflicts with the goal of privacy preservation, and existing schemes fail on either one or both accounts. To fill this gap, we present a hierarchical key management system which uses short group signatures to preserve member privacy at lower levels while allowing mid-level nodes to detect Sybil attacks and highly trusted nodes at the top of the hierarchy to completely reveal the real identities of malicious nodes in order to prevent them from rejoining the system and for use by legal authorities. In addition, we present an argument for relaxing the requirement of backward secrecy in VANET groups in the case when no malicious activity has been detected.
- Published
- 2021
- Full Text
- View/download PDF
136. Leakage-resilient group signature: Definitions and constructions.
- Author
-
Huang, Jianye, Huang, Qiong, and Susilo, Willy
- Subjects
- *
GROUP signatures (Computer security) , *CRYPTOSYSTEMS , *INFORMATION retrieval , *INFORMATION technology , *EAVESDROPPING - Abstract
Group signature scheme provides a way to sign messages without revealing identities of the authentic signers. To achieve such functionality and to avoid the abuse of its power, anonymity and traceability are two essential properties for group signature scheme. In traditional group signature schemes, however, these two security properties are based on the perfectly-secure storage of secret information. Unfortunately, defective implementation of a cryptosystem always exists, and therefore unexpected information leakage is inevitable. In reality, side-channel attacks allow an adversary breaks the security of the whole system by eavesdropping a portion of secret information. To tackle this issue, in our work we present the security models of leakage-resilient group signature in bounded leakage setting and furthermore, propose three new black-box constructions of leakage-resilient group signature based on the proposed security models. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
137. Lattice-Based Group Signature Scheme with Verifier-Local Revocation
- Author
-
Langlois, Adeline, Ling, San, Nguyen, Khoa, Wang, Huaxiong, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, and Krawczyk, Hugo, editor
- Published
- 2014
- Full Text
- View/download PDF
138. A Novel Privacy Protection Protocol for Vehicular Ad Hoc Networks Based on Elliptic Curve Bilinear Mapping.
- Author
-
Haijuan Zang, Yan Huang, Hongbo Cao, and Chenchen Li
- Subjects
ELLIPTIC curves ,PRIVACY ,VEHICULAR ad hoc networks ,SCALABILITY ,ADVERTISING - Abstract
The vehicular ad hoc networks (VANETs) face serious privacy threats, due to the numerous vehicles, variable node speeds and network openness. To tackle the threats, this paper proposes a conditional privacy protection (CPP) mechanism based on group signature anonymous authentication and the cryptographic algorithms of bilinear pairings on elliptic curve. Unlike most existing group signature mechanisms, this mechanism can achieve anonymous and nonconnectable conditions at the same time, and allow the trust authority (TA) to track the identity of the sender of any controversial message. Finally, simulation results show that the CPP outperformed the group signature-based (GSB) protocol and the human anonymous keysbased (HAB) protocol in verification speed, tacking efficiency and scalability. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
139. An efficient RFID anonymous batch authentication protocol based on group signature.
- Author
-
Xu, Jie and Dang, Lanjun
- Subjects
MESSAGE authentication codes ,RADIO frequency ,RANDOM numbers ,SYSTEMS on a chip - Abstract
In order to address the anonymous batch authentication problem of a legal reader to many tags in RFID (Radio Frequency Identification) system, an efficient RFID anonymous batch authentication protocol was proposed based on group signature. The anonymous batch authentications of reader to many tags are achieved by using a one-time group signature based on Hash function; the authentication of the tag to the reader is realized by employing MAC (Message Authentication Code). The tag's anonymity is achieved via the dynamic TID (Temporary Identity) instead of the tag's identity. The proposed protocol can resist replay attacks by using random number. Theoretical analyses show that, the proposed protocol reaches the expected security goals. Compared with the protocol proposed by Liu, the proposed protocol reduces the computation and storage of the server and tag while improving the security. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
140. Lattice-based dynamic group signature for anonymous authentication in IoT.
- Author
-
Xie, Run, He, Chanlian, Xu, Chunxiang, and Gao, Chongzhi
- Abstract
Anonymous authentication is one of the most critical tools for the privacy protection in Internet-of-Things (IoT). The primitive of group signature has been widely applied to achieving anonymous authentication. Any mobile device is able to prove its privilege of the access control to a remote server which is an authenticated device with valid attestation. However, the traditional group signature schemes cannot support dynamic authentication efficiently. Furthermore, they are insecure against quantum attack. To tackle the abovementioned challenges, a new lattice-based dynamic group signature scheme is proposed. The new scheme allows any user to dynamically join the group while achieving efficient revocation. Furthermore, it is shown that the new scheme can achieve the security of non-frameability. The security of non-frameability guarantees that any user's signature can not be forged by other users in the system. In addition, the scheme based on the hardness of lattice problem in the random oracle model is provably secure. The efficiency analysis demonstrates that the scheme is effective in practice. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
141. Scheme on Cross-Domain Identity Authentication Based on Group Signature for Cloud Computing.
- Author
-
Yang, Yanyan, Hu, Mingsheng, Kong, Shan, Gong, Bei, and Liu, Xinxin
- Abstract
In the cloud computing, different cloud service providers are often in different trust domains. As the traditional identity authentication mode cannot be applied to the cloud computing, the cross-domain identity authentication mechanism is needed to solve the identity authentication problem in the cloud computing. In view of the security problems in cloud computing, a cross-domain identity authentication scheme based on group signature is proposed. This scheme introduces a group of cloud service providers and users who are located in different trust domains. Any member of the group can generate the signature on behalf of the whole group, making the user access the cloud service provider in the case of privacy security. At the same time, with traceability it can track illegal operation of illegal users. In addition, the scheme uses the Chinese Remainder Theorem to integrate the message, and it can control the length of the data in the calculation process, simplifying the calculation process. It also realizes the join and revocation of group members without changing the key of other legitimate group members, and the maintenance cost of authentication schemes is low. The results show that the scheme has the advantages of anonymity, anti-counterfeit, traceability, anti- joint attack and so on. It can not only realize tracking function under the condition of guaranteeing user's privacy, but can also simplify the authentication calculation process to improve the efficiency of the cross domain identity authentication, and its performance is more suitable for large-scale cloud computing environment. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
142. NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users
- Author
-
Yuqing Zhang, Anmin Fu, Shui Yu, Huaqun Wang, and Chanying Huang
- Subjects
021110 strategic, defence & security studies ,Information Systems and Management ,Cloud computing security ,Computer science ,business.industry ,0211 other engineering and technologies ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Group signature ,Computer security ,computer.software_genre ,Information sensitivity ,Data integrity ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,Verifiable secret sharing ,08 Information and Computing Sciences ,business ,Cloud storage ,computer ,Information Systems - Abstract
Today, cloud storage becomes one of the critical services, because users can easily modify and share data with others in cloud. However, the integrity of shared cloud data is vulnerable to inevitable hardware faults, software failures or human errors. To ensure the integrity of the shared data, some schemes have been designed to allow public verifiers (i.e., third party auditors) to efficiently audit data integrity without retrieving the entire users' data from cloud. Unfortunately, public auditing on the integrity of shared data may reveal data owners' sensitive information to the third party auditor. In this paper, we propose a new privacy-aware public auditing mechanism for shared cloud data by constructing a homomorphic verifiable group signature. Unlike the existing solutions, our scheme requires at least t group managers to recover a trace key cooperatively, which eliminates the abuse of single-authority power and provides non-frameability. Moreover, our scheme ensures that group users can trace data changes through designated binary tree; and can recover the latest correct data block when the current data block is damaged. In addition, the formal security analysis and experimental results indicate that our scheme is provably secure and efficient.
- Published
- 2022
143. Anonymous Traceability protocol based on Group Signature for Blockchain
- Author
-
Hu Mingsheng, Chong Guo, Li Xiaochong, Chi Cui, Yu-heng Ren, and Bei Gong
- Subjects
Blockchain ,Traceability ,Computer Networks and Communications ,Computer science ,business.industry ,Node (networking) ,Group signature ,Hardware and Architecture ,Wireless ,business ,Personally identifiable information ,Software ,Edge computing ,Anonymity ,Computer network - Abstract
In blockchain technology, data are stored on decentralized nodes and public to each node in the blockchain network. Hence, the focus of privacy protection in the blockchain guarantees the anonymity of transactions such that attackers cannot attain the users’ personal information through data analysis. Among the existing privacy protection technologies, the scheme based on group signature has good anonymity, but the existing scheme exists a large number of operations that are difficult to apply to wireless terminals. In this paper, using the powerful offloading capability of edge computing, we propose a blockchain node traceable identity privacy technology scheme based on threshold group signature, and the scheme greatly reduces the computing burden of nodes while achieving node privacy protection.
- Published
- 2022
144. System for Anonymous Data Collection Based on Group Signature Scheme
- Author
-
David Troják and Dan Komosný
- Subjects
anonymity ,data collection ,sensors ,internet of things ,tor ,group signature ,Agriculture ,Biology (General) ,QH301-705.5 - Abstract
This paper deals with an anonymous data collection in the Internet of Things (IoT). the privacy and anonymity of the data source is important for many IoT applications, such as in agriculture, health, and automotive. the proposed data‑collection system provides anonymity for the data sources by applying a cooperation group scheme. the group scheme also provides a low power consumption. the system is built upon the Tor (The Onion Router) anonymous network, which is a part of the Internet darknet. the proposed system was designed for the Android devices on the client side and for Java environment on the server side. We evaluated the anonymous data collection in a real‑use scenario that covers selected data acquisition (e.g. signal strength) from smartphones triggered by their geographical location change. the results show that the proposed system provides the sufficient data source anonymity, an effective revocation, a low computational cost and a low overhead.
- Published
- 2016
- Full Text
- View/download PDF
145. Anonymous Message Authentication Scheme for Semitrusted Edge-Enabled IIoT
- Author
-
Qingyang Zhang, Yan Xu, Hong Zhong, Fengqun Wang, and Jie Cui
- Subjects
Network security ,business.industry ,Computer science ,020208 electrical & electronic engineering ,Cloud computing ,02 engineering and technology ,Group signature ,Encryption ,Computer security ,computer.software_genre ,Control and Systems Engineering ,Server ,Data integrity ,0202 electrical engineering, electronic engineering, information engineering ,Message authentication code ,Electrical and Electronic Engineering ,business ,computer ,Edge computing ,Anonymity - Abstract
As internet of things and other technologies are widely used in industrial manufacturing, automation and intelligence have witnessed rapid developments, resulting in the proposal of the industrial internet of things (IIoT). However, the IIoT still faces various network security threats; hence, data integrity, confidentiality, and anonymity need to be ensured. The use of cloud and edge servers as semitrusted third parties often results in the leaking of privacy sensitive user data. Meanwhile, existing security schemes treat the cloud and edge as fully trusted entities, which is not always valid. Considering edge servers as semitrusted entities, we propose a novel message authentication scheme that leverages group signature technology and proxy reencryption technology to ensure data integrity, confidentiality, and anonymity. Through theoretical analysis and performance comparison, we prove the security of our scheme. In addition, we implement our scheme on a real publish/subscribe system, and the experimental results show the feasibility of our scheme.
- Published
- 2021
146. Protocols Design and Area Division for Privacy-Preserving Delay-Aware Authentication in Vehicular Networks
- Author
-
Hongke Zhang, Chuan Heng Foh, Qianpeng Wang, Deyun Gao, and Victor C. M. Leung
- Subjects
Scheme (programming language) ,Authentication ,Vehicular ad hoc network ,Access network ,Computer Networks and Communications ,business.industry ,Computer science ,Aerospace Engineering ,Group signature ,Public-key cryptography ,Automotive Engineering ,Scalability ,Electrical and Electronic Engineering ,business ,computer ,Edge computing ,Computer network ,computer.programming_language - Abstract
The problem of security and privacy in vehicular networks is a vital issue, and it attracts increasing attention to address the security vulnerability of vehicular networks. Authentication solutions are introduced for vehicular networks to ensure that network access is only given to authorized users. Among authentication solutions for vehicular networks, group signature not only offers authentication services, but also provides conditional privacy preservation. However, the current group signature approach for authentication in vehicular networks exhibits time-consuming signature verification and poor scalability. To overcome these shortcomings, we propose a flexible and efficient delay-aware authentication scheme (FEDAS) by utilizing edge computing paradigm. In the proposed architecture, we design the authentication group maintaining mechanism and develop the collaborative CRL management method. Moreover, we propose transition zone to solve the reliable authentication problem in border area of the group. To implement the proposed architecture, we propose a model for calculating the length of local CRL, which establishes the relationship between the size of a sub-area and the length of local CRL. And we also design a method for area division based on the length of local CRL, which provides division principle for our authentication scheme. We conduct extensive simulations to verify the effectiveness of our proposed scheme.
- Published
- 2021
147. PAGS: PUF-based Anonymous Group Signature for Node Authentication in Edge Computing
- Author
-
Junqing Lu, Chin-Feng Lai, Jian Shen, and Fei Gao
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Node authentication ,Group signature ,business ,Software ,Edge computing ,Computer network - Published
- 2021
148. An Improved Group Signature Scheme with VLR over Lattices
- Author
-
Yanhua Zhang, Huiwen Jia, Ximeng Liu, Yupu Hu, and Qikun Zhang
- Subjects
Scheme (programming language) ,Science (General) ,Theoretical computer science ,Article Subject ,Revocation ,Computer Networks and Communications ,business.industry ,Computer science ,Group (mathematics) ,Cryptography ,Group signature ,Q1-390 ,Factor (programming language) ,Key (cryptography) ,T1-995 ,business ,computer ,Protocol (object-oriented programming) ,Technology (General) ,Information Systems ,computer.programming_language - Abstract
For group signatures (GS) supporting membership revocation, verifier-local revocation (VLR) mechanism is the most flexible choice. As a post-quantum secure cryptographic counterpart of classical schemes, the first dynamic GS-VLR scheme over lattices was put forward by Langlois et al. at PKC 2014; furthermore, a corrected version was shown at TCS 2018. However, both designs are within Bonsai trees and featuring bit-sizes of group public-key and member secret signing key proportional to log N where N is the group size; therefore, both schemes are not suitable for a large group. In this paper, we provide an improved dynamic GS-VLR over lattices, which is efficient by eliminating a O log N factor for both sizes. To realize the goal, we adopt a more efficient and compact identity-encoding technique. At the heart of our new construction is a new Stern-type statistical zero-knowledge argument of knowledge protocol which may be of some independent cryptographic interest.
- Published
- 2021
149. An Efficient Signature Scheme Based on Mobile Edge Computing in the NDN-IoT Environment
- Author
-
Fu Xiao, Yuhan Wu, Haiping Huang, and Reza Malekian
- Subjects
Authentication ,Mobile edge computing ,business.industry ,Computer science ,Cryptography ,Group signature ,Human-Computer Interaction ,Modeling and Simulation ,Server ,Scalability ,business ,Social Sciences (miscellaneous) ,Key escrow ,Edge computing ,Computer network - Abstract
Named data networking (NDN) is an emerging information-centric networking paradigm, in which the Internet of Things (IoT) achieves excellent scalability. Recent literature proposes the concept of NDN-IoT, which maximizes the expansion of IoT applications by deploying NDN in the IoT. In the NDN, the security is built into the network by embedding a public signature in each data package to verify the authenticity and integrity of the content. However, signature schemes in the NDN-IoT environment are facing several challenges, such as signing security challenge for resource-constrained IoT end devices (EDs) and verification efficiency challenge for NDN routers. This article mainly studies the data package authentication scheme in the package-level security mechanism. Based on mobile edge computing (MEC), an efficient certificateless group signature scheme featured with anonymity, unforgeability, traceability, and key escrow resilience is proposed. The regional and edge architecture is utilized to solve the device management problem of IoT, reducing the risks of content pollution attacks from the data source. By offloading signature pressure to MEC servers, the contradiction between heavy overhead and shortage of ED resources is avoided. Moreover, the verification efficiency in NDN router is much improved via batch verification in the proposed scheme. Both security analysis and experimental simulations show that the proposed MEC-based certificateless group signature scheme is provably secure and practical.
- Published
- 2021
150. A New Approach to Keep the Privacy Information of the Signer in a Digital Signature Scheme
- Author
-
Dung Hoang Duong, Willy Susilo, and Viet Cuong Trinh
- Subjects
digital signature ,signer privacy preserving ,group signature ,strong designated verifier signature ,Information technology ,T58.5-58.64 - Abstract
In modern applications, such as Electronic Voting, e-Health, e-Cash, there is a need that the validity of a signature should be verified by only one responsible person. This is opposite to the traditional digital signature scheme where anybody can verify a signature. There have been several solutions for this problem, the first one is we combine a signature scheme with an encryption scheme; the second one is to use the group signature; and the last one is to use the strong designated verifier signature scheme with the undeniable property. In this paper, we extend the traditional digital signature scheme to propose a new solution for the aforementioned problem. Our extension is in the sense that only a designated verifier (responsible person) can verify a signer’s signature, and if necessary (in case the signer refuses to admit his/her signature) the designated verifier without revealing his/her secret key is able to prove to anybody that the signer has actually generated the signature. The comparison between our proposed solution and the three existing solutions shows that our proposed solution is the best one in terms of both security and efficiency.
- Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.