2017
DOI: 10.1515/popets-2017-0055
|View full text |Cite
|
Sign up to set email alerts
|

Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear Revocation

Abstract: Group signature schemes enable anonymous-yetaccountable communications. Such a capability is extremely useful for applications, such as smartphone-based crowdsensing and citizen science. However, the performance of modern group signature schemes is still inadequate to manage large dynamic groups. In this paper, we design the first provably secure verifier-local revocation (VLR) -based group signature scheme that supports sublinear revocation, named Sublinear Revocation with Backward unlinkability and Exculpabi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
18
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(18 citation statements)
references
References 72 publications
0
18
0
Order By: Relevance
“…Li et al also adopted a pseudonym method to achieve anonymous crowdsourcing, but their proposal cannot detect malicious workers who pretend pseudo IDs for rewards [15]. Rahaman et al used a group signature with sublinear revocation and backward unlinkability and exculpability to construct an anonymous-yetaccountable crowdsourcing system [16]. Gisdakis et al focused on privacy issues during the data crowdsourcing and introduced more authorities to deal with different functionalities [17].…”
Section: Related Workmentioning
confidence: 99%
“…Li et al also adopted a pseudonym method to achieve anonymous crowdsourcing, but their proposal cannot detect malicious workers who pretend pseudo IDs for rewards [15]. Rahaman et al used a group signature with sublinear revocation and backward unlinkability and exculpability to construct an anonymous-yetaccountable crowdsourcing system [16]. Gisdakis et al focused on privacy issues during the data crowdsourcing and introduced more authorities to deal with different functionalities [17].…”
Section: Related Workmentioning
confidence: 99%
“…Li and Cao [9] also adopted a pseudonym method to achieve anonymous crowdsourcing, but their proposal cannot detect malicious workers who pretend pseudo IDs for rewards. Rahaman et al [10] used group signature to construct an anonymous-yet-accountable crowdsourcing systems. Gisdakis et al [11] focused on privacy issues during the data crowdsourcing, and introduced more authorities to deal with different functionalities.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, in crowdsensing, the anonymity of users is desired to preserve the user's privacy, as in Refs. [2], [3], [4]. However, if the user could submit the sensing data anonymously, the service is vulnerable to a malicious user that gives inappropriate sensing data.…”
Section: Introduction 11 Backgroundmentioning
confidence: 99%