Group signature with restrictive linkability: minimizing privacy exposure in ubiquitous environment

As IoT technology evolves, developments of ubiquitous computing accelerates. At the same time, threats of privacy exposure also increase since the IoT systems expose the information such as user’s location or medical status collected from all sorts of things. To handle the data elaborately, the ubiquitous systems need to employ a technology that provides anonymity to prevent exposure of personal information. The group signature scheme is widely used for a cryptographic base for privacy protection which do not reveal user’s identity but prove that he/she is a legitimate user. Recently, a number of researches concerning the basic group signature schemes with a differentiated linkability have been conducted to provide a more flexible service. However, existing researches focused on providing flexible services from the service provider’s position. The systems are exposed to high possibilities of unnecessary breach of privacy. In this paper, we define a restrictive linkability for the anonymous services that require an adequate linkability with a minimum user-designated privacy exposure in anonymous services and propose an efficient group signature scheme providing restrictive linkability.

[1]  Jung Yeon Hwang,et al.  Group signatures with controllable linkability for dynamic membership , 2013, Inf. Sci..

[2]  Jung Yeon Hwang,et al.  Anonymity-based authenticated key agreement with full binding property , 2016, Journal of Communications and Networks.

[3]  Jong Hyuk Park,et al.  Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City , 2017, J. Inf. Process. Syst..

[4]  Jun-Ho Huh,et al.  PLC-based design of monitoring system for ICT-integrated vertical fish farm , 2017, Human-centric Computing and Information Sciences.

[5]  Fei Hao,et al.  Treatment Planning in Smart Medical: A Sustainable Strategy , 2016, J. Inf. Process. Syst..

[6]  Jean-Sébastien Coron,et al.  On the Exact Security of Full Domain Hash , 2000, CRYPTO.

[7]  Jun-Ho Huh,et al.  Design and test bed experiments of server operation system using virtualization technology , 2016, Human-centric Computing and Information Sciences.

[8]  David Pointcheval,et al.  Dynamic Fully Anonymous Short Group Signatures , 2006, VIETCRYPT.

[9]  Jan Camenisch,et al.  A Group Signature Scheme with Improved Efficiency , 1998, ASIACRYPT.

[10]  Mihir Bellare,et al.  Foundations of Group Signatures: The Case of Dynamic Groups , 2005, CT-RSA.

[11]  Moti Yung,et al.  Short Traceable Signatures Based on Bilinear Pairings , 2006, IWSEC.

[12]  Josep Domingo-Ferrer,et al.  Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications , 2010, IEEE Transactions on Vehicular Technology.

[13]  Jacques Stern,et al.  Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.

[14]  Hovav Shacham,et al.  Short Group Signatures , 2004, CRYPTO.

[15]  Jung Yeon Hwang,et al.  Short Group Signatures with Controllable Linkability , 2011, 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications.

[16]  David Chaum,et al.  Group Signatures , 1991, EUROCRYPT.