Journal on Communications ›› 2022, Vol. 43 ›› Issue (3): 63-75.doi: 10.11959/j.issn.1000-436x.2022053
• Papers • Previous Articles Next Articles
Huamin FENG1,2, Rui SHI1,2, Feng YUAN3, Yanjun LI4, Yang YANG5
Revised:
2022-02-22
Online:
2022-03-25
Published:
2022-03-01
Supported by:
CLC Number:
Huamin FENG, Rui SHI, Feng YUAN, Yanjun LI, Yang YANG. Efficient strong privacy protection and transferable attribute-based ticket scheme[J]. Journal on Communications, 2022, 43(3): 63-75.
[1] | HAN J G , CHEN L Q , SCHNEIDER S ,et al. Anonymous single sign-on with proxy re-verification[J]. IEEE Transactions on Information Forensics and Security, 2020,15: 223-236. |
[2] | HAN J G , CHEN L Q , SCHNEIDER S ,et al. Privacy-preserving electronic ticket scheme with attribute-based credentials[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(4): 1836-1849. |
[3] | HEYDT-BENJAMIN T S , CHAE H J , DEFEND B ,et al. Privacy for public transportation[C]// International Workshop on Privacy Enhancing Technologies. Berlin:Springer, 2006: 1-19. |
[4] | CHAUM D . Security without identification:transaction systems to make big brother obsolete[J]. Communications of the ACM, 1985,28(10): 1030-1044. |
[5] | VIVES-GUASCH A , PAYERAS-CAPELLà M M , MUT-PUIGSERVER M ,et al. Anonymous and transferable electronic ticketing scheme[C]// Data Privacy Management and Autonomous Spontaneous Security. Berlin:Springer, 2014: 100-113. |
[6] | PAYERAS-CAPELLà M M , MUT-PUIGSERVER M , CASTELLà-ROCA J ,et al. Design and performance evaluation of two approaches to obtain anonymity in transferable electronic ticketing schemes[J]. Mobile Networks and Applications, 2017,22(6): 1137-1156. |
[7] | ARFAOUI G , LALANDE J F , TRAORé J , ,et al. A practical set-membership proof for privacy-preserving NFC mobile ticketing[J]. Proceedings on Privacy Enhancing Technologies, 2015,2015(2): 25-45. |
[8] | CAMENISCH J , LYSYANSKAYA A . An efficient system for non-transferable anonymous credentials with optional anonymity revocation[C]// International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2001: 93-118. |
[9] | LYSYANSKAYA A , RIVEST R L , SAHAI A ,et al. Pseudonym systems[C]// International Workshop on Selected Areas in Cryptography. Berlin:Springer, 2000: 184-199. |
[10] | CHAUM D , . Blind signatures for untraceable payments[C]// Advances in Cryptology. Berlin:Springer, 1983: 199-203. |
[11] | CHAUM D , VAN HEYST E . Group signatures[C]// Workshop on the Theory and Application of of Cryptographic Techniques. Berlin:Springer, 1991: 257-265. |
[12] | CAMENISCH J , LYSYANSKAYA A . Signature schemes and anonymous credentials from bilinear maps[C]// Advances in Cryptology –CRYPTO 2004. Berlin:Springer, 2004: 56-72. |
[13] | AU M H , SUSILO W , MU Y . Constant-size dynamic k-TAA[C]// International Conference on Security and Cryptography for Networks. Berlin:Springer, 2006: 111-125. |
[14] | POINTCHEVAL D , SANDERS O . Short randomizable signatures[J]. IACR Cryptology ePrint Archive,2015, 2015:525. |
[15] | BOBOLZ J , EIDENS F , KRENN S ,et al. Privacy-preserving incentive systems with highly efficient point-collection[C]// Proceedings of the 15th ACM Asia Conference on Computer and Communications Security. New York:ACM Press, 2020: 319-333. |
[16] | QUERCIA D , HAILES S . MOTET:mobile transactions using electronic tickets[C]// Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks. Piscataway:IEEE Press, 2005: 374-383. |
[17] | RUPP A , HINTERW?LDER G , BALDIMTSI F ,et al. P4R:privacy-preserving pre-payments with refunds for transportation systems[C]// International Conference on Financial Cryptography and Data Security. Berlin:Springer, 2013: 205-212. |
[18] | BONEH D , LYNN B , SHACHAM H . Short signatures from the Weil pairing[C]// Advances in Cryptology — ASIACRYPT 2001. Springer:Berlin, 2001: 514-532. |
[19] | MILUTINOVIC M , DECROIX K , NAESSENS V ,et al. Privacy-preserving public transport ticketing system[C]// IFIP Annual Conference on Data and Applications Security and Privacy. Berlin:Springer, 2015: 135-150. |
[20] | ABE M , OKAMOTO T . Provably secure partially blind signatures[C]// Advances in Cryptology — CRYPTO 2000. Springer:Berlin, 2000: 271-286. |
[21] | PEDERSEN T P , . Non-interactive and information-theoretic secure verifiable secret sharing[C]// Advances in Cryptology — CRYPTO’91. Springer:Berlin, 1992: 129-140. |
[22] | NAKANISHI T , HARUNA N , SUGIYAMA Y . Unlinkable electronic coupon protocol with anonymity control[C]// International Workshop on Information Security. Berlin:Springer, 1999: 37-46. |
[23] | VIVES-GUASCH A , CASTELLà-ROCA J , PAYERAS-CAPELLA M M ,et al. An electronic and secure automatic fare collection system with revocable anonymity for users[C]// Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia. New York:ACM Press, 2010: 387-392. |
[24] | BONEH D , BOYEN X . Short signatures without random ora-cles[C]// International Conference on the Theory and Applications of Cryptographic Techniques. Springer:Berlin, 2004: 56-73. |
[25] | VIVES-GUASCH A , PAYERAS-CAPELLà M M , MUT-PUIGSERVER M ,et al. A secure E-ticketing scheme for mobile devices with near field communication (NFC) that includes exculpability and reusability[J]. IEICE Transactions on Information and Systems, 2012,95(1): 78-93. |
[26] | CHASE M , LYSYANSKAYA A . On signatures of knowledge[C]// Annual International Cryptology Conference. Berlin:Springer, 2006: 78-96. |
[27] | FUCHSBAUER G , HANSER C , SLAMANIG D . Structure-preserving signatures on equivalence classes and constant-size anonymous credentials[J]. Journal of Cryptology, 2019,32(2): 498-546. |
[28] | HANSER C , SLAMANIG D . Structure-preserving signatures on equivalence classes and their application to anonymous credentials[C]// International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2014: 491-511. |
[29] | BL?MER J , BOBOLZ J . Delegatable attribute-based anonymous credentials from dynamically malleable signatures[C]// International Conference on Applied Cryptography and Network Security. Berlin:Springer, 2018: 221-239. |
[1] | Xindi MA, Qinghua LI, Qi JIANG, Zhuo MA, Sheng GAO, Youliang TIAN, Jianfeng MA. Byzantine-robust federated learning over Non-IID data [J]. Journal on Communications, 2023, 44(6): 138-153. |
[2] | Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption [J]. Journal on Communications, 2023, 44(5): 224-233. |
[3] | Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI. Multi-function supported privacy protection data aggregation scheme for V2G network [J]. Journal on Communications, 2023, 44(4): 187-200. |
[4] | Ming XU, Baojun ZHANG, Yiming WU, Chenduo YING, Ning ZHENG. Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems [J]. Journal on Communications, 2023, 44(3): 117-127. |
[5] | Xuewang ZHANG, Zhihong LI, Jinzhao LIN. Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain [J]. Journal on Communications, 2022, 43(8): 131-141. |
[6] | Jifeng WANG, Guofeng WANG. Research on ciphertext search and sharing technology in edge computing mode [J]. Journal on Communications, 2022, 43(4): 227-238. |
[7] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
[8] | Hui LIU, Xinyan LIU, Yan XU, Hong ZHONG, Meng WANG. Privacy protection of warning message publishing protocol in VANET [J]. Journal on Communications, 2021, 42(8): 120-129. |
[9] | Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. |
[10] | Wenbo ZHANG, Wenhua HUANG, Jingyu FENG. Secure communication mechanism for VSN based on certificateless signcryption [J]. Journal on Communications, 2021, 42(7): 128-136. |
[11] | Jie CUI, Xuefeng CHEN, Jing ZHANG, Lu WEI, Hong ZHONG. Bus cache-based location privacy protection scheme in the Internet of vehicles [J]. Journal on Communications, 2021, 42(7): 150-161. |
[12] | Guangjun LIU, Wangmei GUO, Jinbo XIONG, Ximeng LIU, Changyu DONG. Lightweight privacy protection data auditing scheme for regenerating-coding-based distributed storage [J]. Journal on Communications, 2021, 42(7): 220-230. |
[13] | Yubo SONG, Qi CHEN, Rui SONG, Aiqun HU. Android application privacy protection mechanism based on virtual machine bytecode injection [J]. Journal on Communications, 2021, 42(6): 171-181. |
[14] | Youhuizi LI, Yuyu YIN, Honghao GAO, Yi JIN, Xinheng WANG. Survey on privacy protection in non-aggregated data sharing [J]. Journal on Communications, 2021, 42(6): 195-212. |
[15] | Yongming HUANG, Chong ZHENG, Zhengming ZHANG, Xiaohu YOU. Research on mobile edge computing and caching in massive wireless communication network [J]. Journal on Communications, 2021, 42(4): 44-61. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|