Skip to main content
Top
Published in: Mobile Networks and Applications 6/2017

24-05-2016

Design and Performance Evaluation of Two Approaches to Obtain Anonymity in Transferable Electronic Ticketing Schemes

Authors: M. Magdalena Payeras-Capellà, Macià Mut-Puigserver, Jordi Castellà-Roca, Julio Bondia-Barceló

Published in: Mobile Networks and Applications | Issue 6/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Electronic tickets demonstrate, without the use of paper, the possession of the right to access or use of a service. In this scenario, the security and privacy achieved in the paper-based system must be preserved in the electronic ticketing systems. In addition to these requirements, the transferability of a ticket from one user to another (without involving a third party) is very useful but also generates other issues to be solved in terms of security and privacy. For example, the users that transfer the same ticket twice must be identified (it is a fraud), but the rest of users have to preserve their privacy (anonymity). In this article we present two proposals of an electronic ticketing system with anonymity and transferability, based on the use of RSA signatures or group signatures, respectively, thus presenting different levels of complexity and anonymity. Moreover, we have implemented both proposals and its performance has been evaluated. The results of this evaluation are useful in order to prove the viability of the proposals even when complex cryptography is used. The strength of the anonymity and the execution costs are the parameters to take into account to choose the more adequate proposal for a specific application.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
1.
go back to reference Vives-Guasch A, Payeras-Capellȧ M, Mut Puigserver M, Castellȧ-Roca J, Ferrer-Gomila J (2013) Anonymous and transferable electronic ticketing scheme. In: En data privacy management and autonomous spontaneous security, DPM 2013, LNCS 8247. Springer, pp 100–113 Vives-Guasch A, Payeras-Capellȧ M, Mut Puigserver M, Castellȧ-Roca J, Ferrer-Gomila J (2013) Anonymous and transferable electronic ticketing scheme. In: En data privacy management and autonomous spontaneous security, DPM 2013, LNCS 8247. Springer, pp 100–113
2.
go back to reference Blazy O, Canard S, Fuchsbauer G, Gouget A, Sibert H, Traoré J (2011) Achieving optimal anonymity in transferable e-cash with a judge. In: Progress in cryptology, AFRICACRYPT 2011, volume 6737 of lecture notes in computer science. Springer, Berlin, pp 206–223 Blazy O, Canard S, Fuchsbauer G, Gouget A, Sibert H, Traoré J (2011) Achieving optimal anonymity in transferable e-cash with a judge. In: Progress in cryptology, AFRICACRYPT 2011, volume 6737 of lecture notes in computer science. Springer, Berlin, pp 206–223
3.
go back to reference Boneh D, Boyen X, Shacham H (2004) Short group signatures. In: CRYPTO, volume 3152 of LNCS. Springer, pp 41–55 Boneh D, Boyen X, Shacham H (2004) Short group signatures. In: CRYPTO, volume 3152 of LNCS. Springer, pp 41–55
4.
go back to reference Chen Y, Chen C-L, Jan J-K (2007) A mobile ticket system based on personal trusted device. Wireless Person Commun 40(4):569–578CrossRef Chen Y, Chen C-L, Jan J-K (2007) A mobile ticket system based on personal trusted device. Wireless Person Commun 40(4):569–578CrossRef
5.
go back to reference Ghiron S, Sposato S, Medaglia C, Moroni A (2009) Nfc ticketing: a prototype and usability test of an nfc-based virtual ticketing application. In: Near field communication, NFC ’09. IEEE, p 45–50 Ghiron S, Sposato S, Medaglia C, Moroni A (2009) Nfc ticketing: a prototype and usability test of an nfc-based virtual ticketing application. In: Near field communication, NFC ’09. IEEE, p 45–50
6.
go back to reference Heydt-Benjamin TS, Chae H-J, Defend B, Fu K (2006) Privacy for public transportation. In: 6th Workshop on privacy enhancing technologies (PET 2006), LNCS 4258. Springer, p 1–19 Heydt-Benjamin TS, Chae H-J, Defend B, Fu K (2006) Privacy for public transportation. In: 6th Workshop on privacy enhancing technologies (PET 2006), LNCS 4258. Springer, p 1–19
7.
go back to reference Isern-Deya AP, Vives-Guasch, Mut-Puigserver M, Payeras-Capella M, Castella-Roca J (2012) A secure automatic fare collection system for time-based or distance-based services with revocable anonymity for users. Comput J Isern-Deya AP, Vives-Guasch, Mut-Puigserver M, Payeras-Capella M, Castella-Roca J (2012) A secure automatic fare collection system for time-based or distance-based services with revocable anonymity for users. Comput J
8.
go back to reference Jao D, Yoshida K (2009) Boneh-boyen signatures and the strong difie-hellman problem. In: Pairing based cryptography, volume 5671 of LNCS. Springer, pp 41–55 Jao D, Yoshida K (2009) Boneh-boyen signatures and the strong difie-hellman problem. In: Pairing based cryptography, volume 5671 of LNCS. Springer, pp 41–55
9.
go back to reference Jorns O, Jung O, Quirchmayr G (2007) A privacy enhancing service architecture for ticket-based mobile applications. In: Availability, reliability and security. ARES 2007 - The international dependability conference, vol 24, pp 374–383 Jorns O, Jung O, Quirchmayr G (2007) A privacy enhancing service architecture for ticket-based mobile applications. In: Availability, reliability and security. ARES 2007 - The international dependability conference, vol 24, pp 374–383
10.
go back to reference Mut-Puigserver M, Payeras-Capella MM, Ferrer-Gomila J-L, Vives-Guasch A, Castella-Roca J (2012) A survey of electronic ticketing applied to transport. Comput Secur 31(8):925–939CrossRef Mut-Puigserver M, Payeras-Capella MM, Ferrer-Gomila J-L, Vives-Guasch A, Castella-Roca J (2012) A survey of electronic ticketing applied to transport. Comput Secur 31(8):925–939CrossRef
11.
go back to reference Quercia D, Hailes S (2005) Motet: mobile transactions using electronic tickets. In: Security and privacy for emerging areas in communications networks, proceedings, vol 24, pp 374–383 Quercia D, Hailes S (2005) Motet: mobile transactions using electronic tickets. In: Security and privacy for emerging areas in communications networks, proceedings, vol 24, pp 374–383
12.
go back to reference Vives-Guasch A, Castella-Roca J, Payeras-Capela M, Mut M (2010) An electronic and secure automatic fare collection system with revocable anonymity for users. In: Advances in mobile computing and multimedia (MoMM) Vives-Guasch A, Castella-Roca J, Payeras-Capela M, Mut M (2010) An electronic and secure automatic fare collection system with revocable anonymity for users. In: Advances in mobile computing and multimedia (MoMM)
13.
go back to reference Vives-Guasch A, Payeras-Capella MM, Mut-Puigserver M, Castella-Roca J, Ferrer-Gomila JL (2012) A secure e-ticketing scheme for mobile devices with near field communication (nfc) that includes exculpability and reusability. IEICE E95-D(1) Vives-Guasch A, Payeras-Capella MM, Mut-Puigserver M, Castella-Roca J, Ferrer-Gomila JL (2012) A secure e-ticketing scheme for mobile devices with near field communication (nfc) that includes exculpability and reusability. IEICE E95-D(1)
14.
go back to reference De Caro A, Iovino V (2011) jPBC: Java pairing based cryptography. In: Proceedings of the 16th IEEE symposium on computers and communications, ISCC 2011. IEEE, pp 850–855 De Caro A, Iovino V (2011) jPBC: Java pairing based cryptography. In: Proceedings of the 16th IEEE symposium on computers and communications, ISCC 2011. IEEE, pp 850–855
15.
go back to reference Menezes A An introduction to pairing-based cryptography. Recent Trends in Cryptography. Contemporary Mathematics. Volume 477 Menezes A An introduction to pairing-based cryptography. Recent Trends in Cryptography. Contemporary Mathematics. Volume 477
Metadata
Title
Design and Performance Evaluation of Two Approaches to Obtain Anonymity in Transferable Electronic Ticketing Schemes
Authors
M. Magdalena Payeras-Capellà
Macià Mut-Puigserver
Jordi Castellà-Roca
Julio Bondia-Barceló
Publication date
24-05-2016
Publisher
Springer US
Published in
Mobile Networks and Applications / Issue 6/2017
Print ISSN: 1383-469X
Electronic ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-016-0732-6

Other articles of this Issue 6/2017

Mobile Networks and Applications 6/2017 Go to the issue