Skip to main content

2018 | OriginalPaper | Buchkapitel

Implementation of a Pseudonym-Based Signature Scheme with Bilinear Pairings on Android

verfasst von : Leonardo Oliveira, Victor Sucasas, Georgios Mantas, Jonathan Rodriguez

Erschienen in: Cognitive Radio Oriented Wireless Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Privacy preservation is of paramount importance in the emerging smart city scenario, where numerous and diverse online services will be accessed by users through their mobile or wearable devices. In this scenario, service providers or eavesdroppers can track users’ activities, location, and interactions with other users, which may discourage citizens from accessing smart city services. Pseudonym-based systems have been proposed as an efficient solution to provide identity confidentiality, and more concretely pseudonym-based signature schemes have been suggested as an effective means to authenticate entities and messages privately. In this paper we describe our implementation of a pseudonym-based signature scheme, based on bilinear-pairings. Concretely, our implementation consists of an Android application that enables users to authenticate messages under self-generated pseudonyms, while still enabling anonymity revocation by a trusted third party in case of misbehavior. The paper presents a description of the implementation, performance results, and it also describes the use cases for which it was designed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Li, M., Lou, W., Ren, K.: Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1), 51–58 (2010)CrossRef Li, M., Lou, W., Ren, K.: Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1), 51–58 (2010)CrossRef
2.
Zurück zum Zitat Wasef, A., Lu, R., Lin, X., Shen, X.: Complementing public key infrastructure to secure vehicular ad hoc networks [security and privacy in emerging wireless networks]. IEEE Wirel. Commun. 17(5), 22–28 (2010)CrossRef Wasef, A., Lu, R., Lin, X., Shen, X.: Complementing public key infrastructure to secure vehicular ad hoc networks [security and privacy in emerging wireless networks]. IEEE Wirel. Commun. 17(5), 22–28 (2010)CrossRef
4.
Zurück zum Zitat Huang, J.-L., Yeh, L.-Y., Chien, H.-Y.: ABAKA: an anonymous batch authenticated and key agreement scheme for value added services in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 60(1), 248–262 (2011)CrossRef Huang, J.-L., Yeh, L.-Y., Chien, H.-Y.: ABAKA: an anonymous batch authenticated and key agreement scheme for value added services in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 60(1), 248–262 (2011)CrossRef
5.
Zurück zum Zitat Lu, R., Lin, X., Shi, Z., Shen, X.S.: A lightweight conditional privacy-preservation protocol for vehicular traffic-monitoring systems. IEEE Intell. Syst. 28(3), 62–65 (2013)CrossRef Lu, R., Lin, X., Shi, Z., Shen, X.S.: A lightweight conditional privacy-preservation protocol for vehicular traffic-monitoring systems. IEEE Intell. Syst. 28(3), 62–65 (2013)CrossRef
6.
Zurück zum Zitat Zhang, Y., Chen, J.-L.: A delegation solution for universal identity management in SOA. IEEE Trans. Serv. Comput. 4(1), 70–81 (2011)CrossRef Zhang, Y., Chen, J.-L.: A delegation solution for universal identity management in SOA. IEEE Trans. Serv. Comput. 4(1), 70–81 (2011)CrossRef
7.
Zurück zum Zitat Sucasas, V., Mantas, G., Saghezchi, F.B., Radwan, A., Rodriguez, J.: An autonomous privacy-preserving authentication scheme for intelligent transportation systems. Comput. Secur. 60, 193–205 (2016)CrossRef Sucasas, V., Mantas, G., Saghezchi, F.B., Radwan, A., Rodriguez, J.: An autonomous privacy-preserving authentication scheme for intelligent transportation systems. Comput. Secur. 60, 193–205 (2016)CrossRef
8.
Zurück zum Zitat Sucasas, V., Mantas, G., Radwan, A., Rodriguez, J.: An OAuth2-based protocol with strong user privacy preservation for smart city mobile e-Health apps. In: IEEE ICC (2016) Sucasas, V., Mantas, G., Radwan, A., Rodriguez, J.: An OAuth2-based protocol with strong user privacy preservation for smart city mobile e-Health apps. In: IEEE ICC (2016)
9.
Zurück zum Zitat Sucasas, V., Mantas, G., Radwan, A., Rodriguez, J.: A lightweight privacy-preserving OAuth2-based protocol for smart city mobile apps. In: GLOBECOM Workshops (2016) Sucasas, V., Mantas, G., Radwan, A., Rodriguez, J.: A lightweight privacy-preserving OAuth2-based protocol for smart city mobile apps. In: GLOBECOM Workshops (2016)
10.
Zurück zum Zitat De Caro, A., Iovino, V. jPBC: Java pairing based cryptography. In: Proceedings of the 16th IEEE Symposium on Computers and Communications, ISCC (2011) De Caro, A., Iovino, V. jPBC: Java pairing based cryptography. In: Proceedings of the 16th IEEE Symposium on Computers and Communications, ISCC (2011)
Metadaten
Titel
Implementation of a Pseudonym-Based Signature Scheme with Bilinear Pairings on Android
verfasst von
Leonardo Oliveira
Victor Sucasas
Georgios Mantas
Jonathan Rodriguez
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-76207-4_7