Journal on Communications ›› 2022, Vol. 43 ›› Issue (10): 26-41.doi: 10.11959/j.issn.1000-436x.2022156
• Papers • Previous Articles Next Articles
Rui SHI1,2, Huamin FENG1,2, Huiqin XIE2, Guozhen SHI2, Biao LIU2, Yang YANG3
Revised:
2022-08-03
Online:
2022-10-25
Published:
2022-10-01
Supported by:
CLC Number:
Rui SHI, Huamin FENG, Huiqin XIE, Guozhen SHI, Biao LIU, Yang YANG. Privacy-preserving attribute ticket scheme based on mobile terminal with smart card[J]. Journal on Communications, 2022, 43(10): 26-41.
[1] | MUT-PUIGSERVER M , PAYERAS-CAPELLà M M , FERRERGOMILA J L ,et al. A survey of electronic ticketing applied to transport[J]. Computers & Security, 2012,31(8): 925-939. |
[2] | VIVES-GUASCH A , PAYERAS-CAPELLà M M , MUT-PUIGSERVER M ,et al. Anonymous and transferable electronic ticketing scheme[C]// Data Privacy Management and Autonomous Spontaneous Security. Berlin:Springer, 2013: 100-113. |
[3] | HEYDT-BENJAMIN T S , CHAE H J , DEFEND B ,et al. Privacy for public transportation[C]// International Workshop on Privacy Enhancing Technologies. Berlin:Springer, 2006: 1-19. |
[4] | MILUTINOVIC M , DECROIX K , NAESSENS V ,et al. Privacy-preserving public transport ticketing system[C]// IFIP Annual Conference on Data and Applications Security and Privacy. Berlin:Springer, 2015: 135-150. |
[5] | PATEL B , CROWCROFT J . Ticket based service access for the mobile user[C]// Proceedings of the 3rd Annual ACM/IEEE International Conference on Mobile Computing and Networking. New York:ACM Press, 1997: 223-233. |
[6] | HAN J G , CHEN L Q , SCHNEIDER S ,et al. Privacy-preserving electronic ticket scheme with attribute-based credentials[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(4): 1836-1849. |
[7] | FAN C , LEI C L . Multi-recastable ticket schemes for electronic voting[J]. IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences, 1998,81(5): 940-949. |
[8] | SONG R G , KORBA L . Pay-TV system with strong privacy and non-repudiation protection[J]. IEEE Transactions on Consumer Electronics, 2003,49(2): 408-413. |
[9] | QUERCIA D , HAILES S . MOTET:mobile transactions using electronic tickets[C]// Proceedings of First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05). Piscataway:IEEE Press, 2005: 374-383. |
[10] | RUPP A , HINTERW?LDER G , BALDIMTSI F ,et al. P4R:privacy-preserving pre-payments with refunds for transportation systems[C]// International Conference on Financial Cryptography and Data Security. Berlin:Springer, 2013: 205-212. |
[11] | CHAUM D , . Blind signatures for untraceable payments[C]// Advances in Cryptology. Berlin:Springer, 1983: 199-203. |
[12] | NAKANISHI T , HARUNA N , SUGIYAMA Y . Unlinkable electronic coupon protocol with anonymity control[C]// International Workshop on Information Security. Berlin:Springer, 1999: 37-46. |
[13] | VIVES-GUASCH A , CASTELLà-ROCA J , PAYERAS-CAPELLA M M ,et al. An electronic and secure automatic fare collection system with revocable anonymity for users[C]// Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia. Piscataway:IEEE Press, 2010: 387-392. |
[14] | CHAUM D , HEYST E . Group signatures[C]// Workshop on the Theory and Application of of Cryptographic Techniques. Berlin:Springer, 1991: 257-265. |
[15] | ARFAOUI G , LALANDE J F , TRAORé J , ,et al. A practical set-membership proof for privacy-preserving NFC mobile ticketing[J]. Proceedings on Privacy Enhancing Technologies, 2015,2015(2): 25-45. |
[16] | CHAUM D . Security without identification:transaction systems to make big brother obsolete[J]. Communications of the ACM, 1985,28(10): 1030-1044. |
[17] | 封化民, 史瑞, 袁峰 ,等. 高效的强隐私保护和可转让的属性票据方案[J]. 通信学报, 2022,43(3): 63-75. |
FENG H M , SHI R , YUAN F ,et al. Efficient strong privacy protection and transferable attribute-based ticket scheme[J]. Journal on Communications, 2022,43(3): 63-75. | |
[18] | MOSTOWSKI W , VULLERS P . Efficient U-prove implementation for anonymous credentials on smart cards[C]// International Conference on Security and Privacy in Communication Systems. Berlin:Springer, 2011: 243-260. |
[19] | CAMENISCH J , DRIJVERS M , DZURENDA P ,et al. Fast keyed-verification anonymous credentials on standard smart cards[C]// IFIP International Conference on ICT Systems Security and Privacy Protection. Berlin:Springer, 2019: 286-298. |
[20] | VERHEUL E R , . Self-blindable credential certificates from the Weil pairing[C]// International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2001: 533-551. |
[21] | HANZLIK L , SLAMANIG D . With a little help from my friends:constructing practical anonymous credentials[C]// Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2021: 2004-2023. |
[22] | GALBRAITH S D , PATERSON K G , SMART N P . Pairings for cryptographers[J]. Discrete Applied Mathematics, 2008,156(16): 3113-3121. |
[23] | CHASE M , LYSYANSKAYA A . On signatures of knowledge[C]// Annual International Cryptology Conference. Berlin:Springer, 2006: 78-96. |
[24] | H’EBANT C , POINTCHEVAL D . Traceable constant-size multi-authority credentials[R]. Cryptology ePrint Archive, 2020. |
[25] | SHOUP V , . Lower bounds for discrete logarithms and related problems[C]// International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 1997: 256-266. |
[26] | POINTCHEVAL D , SANDERS O . Short randomizable signatures[C]// Cryptographers’ Track at the RSA Conference. Berlin:Springer, 2016: 111-126. |
[27] | SONNINO A , AL-BASSAM M , BANO S ,et al. Coconut:threshold issuance selective disclosure credentials with applications to distributed ledgers[J]. arXiv Preprint,arXiv:1802.07344, 2018. |
[28] | ELGAMAL T . A public key cryptosystem and a signature scheme based on discrete logarithms[J]. IEEE Transactions on Information Theory, 1985,31(4): 469-472. |
[29] | FAN J , VERCAUTEREN F , VERBAUWHEDE I . Faster FP-arithmetic for cryptographic pairings on Barreto-Naehrig curves[C]// International Workshop on Cryptographic Hardware and Embedded Systems. Berlin:Springer, 2009: 240-253. |
[1] | Yingjie XIA, Siyu ZHU, Xuejiao LIU. Research on efficient cross trust-domain group authentication with conditional privacy of vehicle platoon under blockchian architecture [J]. Journal on Communications, 2023, 44(4): 111-123. |
[2] | Yanshuo ZHANG, Ning LIU, Yuqi YUAN, Yatao YANG. Adaptor signature scheme based on ISRSAC digital signature algorithm [J]. Journal on Communications, 2023, 44(3): 178-185. |
[3] | Shengxing YU, Zhong CHEN. Efficient secure federated learning aggregation framework based on homomorphic encryption [J]. Journal on Communications, 2023, 44(1): 14-28. |
[4] | Yiming XUE, Shurong LIU, Shuheng GUO, Yan LI, Cai’e HU. High-speed hardware architecture design and implementation of Ed25519 signature verification algorithm [J]. Journal on Communications, 2022, 43(3): 101-112. |
[5] | Hong WANG, Chengzhe LAI, Xiangyang LIU, Han ZENG. Orthogonal Latin square theory based group and batch verification for digital signatures [J]. Journal on Communications, 2022, 43(2): 44-54. |
[6] | Haining YU, Hongli ZHANG, Xiangzhan YU, Jiaxing QU, Mengmeng GE. Privacy-preserving trajectory similarity computation method [J]. Journal on Communications, 2022, 43(11): 1-13. |
[7] | Tao PENG, Wentao ZHONG, Guojun WANG, Entao LUO, Jinbo XIONG, Yining LIU, Wang Hao. Privacy-preserving precise profile matching in mobile social network [J]. Journal on Communications, 2022, 43(11): 90-103. |
[8] | Jinbo XIONG, Yongjie ZHOU, Renwan BI, Liang WAN, Youliang TIAN. Towards edge-collaborative, lightweight and privacy-preserving classification framework [J]. Journal on Communications, 2022, 43(1): 127-137. |
[9] | Lei HE, Jianfeng MA, Dawei WEI. Attribute-based proxy signature scheme for unmanned aerial vehicle networks [J]. Journal on Communications, 2021, 42(11): 87-96. |
[10] | Jiaqi WANG,Ning LU,Qingfeng CHENG,Zhaoxia WU,Wenbo SHI. Privacy-preserving multi-attribute reverse spectrum auction scheme [J]. Journal on Communications, 2020, 41(9): 77-91. |
[11] | Yousheng ZHOU,Chang TAN,Fei TANG. Multi-dimensional secure query scheme for fog-enhanced IIoT [J]. Journal on Communications, 2020, 41(8): 175-186. |
[12] | Jiayin LI,Wenzhong GUO,Xiaoyan LI,Ximeng LIU. Privacy-preserving real-time road conditions monitoring scheme based on intelligent traffic [J]. Journal on Communications, 2020, 41(7): 73-83. |
[13] | Ming LI,Xiaopeng YANG,Hui ZHU,Fengwei WANG,Qi LI. Efficient and privacy-preserving online face authentication scheme [J]. Journal on Communications, 2020, 41(5): 205-214. |
[14] | Xinyu WANG,Ben NIU,Fenghua LI,Kun HE. Risk assessing and privacy-preserving scheme for privacy leakage in APP [J]. Journal on Communications, 2019, 40(5): 13-23. |
[15] | Xiaoling YIN,Xiaojiang CHEN,Qishou XIA,Juan HE,Pengyan ZHANG,Feng CHEN. Human motion state recognition based on smart phone built-in sensor [J]. Journal on Communications, 2019, 40(3): 157-169. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|