2015
DOI: 10.1002/sec.1383
|View full text |Cite
|
Sign up to set email alerts
|

Light‐weight group signatures with time‐bound membership

Abstract: This paper presents a novel privacy-preserving cryptographic protocol for secure many-to-one communication systems, for example, data collection systems, data gathering systems, vehicular networks, smart-grids, and so on. The proposed solution provides message authenticity, integrity, and non-repudiation, while message senders are anonymous and untraceable. The protocol is based on group signatures with a time-bound membership. The protocol is designed to achieve efficiency on the client side where restricted … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 34 publications
0
4
0
Order By: Relevance
“…Another important aspect of group signature is batch verification, which increases verification efficiency by simultaneously verifying multiple signatures [45], [46]. They given a few essential perceptions to decide while matching conditions can be bunch checked and how to create a proficient bunch verifier, trailed by [47].…”
Section: A Group Signaturesmentioning
confidence: 99%
“…Another important aspect of group signature is batch verification, which increases verification efficiency by simultaneously verifying multiple signatures [45], [46]. They given a few essential perceptions to decide while matching conditions can be bunch checked and how to create a proficient bunch verifier, trailed by [47].…”
Section: A Group Signaturesmentioning
confidence: 99%
“…Besides, time-bound keys (TBK) management techniques [30], which means that secret key is embedded with a timestamp, are usually combined with group key management, broadcast encryption, group signature, attribute-based encryption for efficient revocation, access control, and anonymous authentication on the time dimension [5,[31][32][33][34]. It is crucial to highlight that, for the sake of downsizing the expense of RC in practical settings, Chu et al [31] detailed a feasible method called group signature with time-bound keys (GS-TBK).…”
Section: Iot Devicesmentioning
confidence: 99%
“…Constant signing cost was provided, unlike the earlier solution where the efficiency of signing depends entirely on the length of bits representing the time. Similarly, Malina et al [33] and Perera et al [28] provided group signatures with time-bound membership but not consider premature revocation and fail to resist forgeability signing time and expiry time.…”
Section: Iot Devicesmentioning
confidence: 99%
“…As the advancement of mobile ad-hoc networks (MANETs) including vehicular ad-hoc networks (VANETs), security and privacy are now becoming a matter that is very mandatory to be considered [1]- [5]. We can not deny due to such networks are infrastructureless networks accessed freely and wirelessly at anytime and anywhere as long as the device can reach them.…”
mentioning
confidence: 99%
“…al. [4], [5] introduced an efficient group signature for privacy-preserving in the vehicular networks. The proposed system is able to minimize the impact of several common attacks such as denial of services (DoS) and reply attacks.…”
mentioning
confidence: 99%