Cognitive Radio Oriented Wireless Networks. 12th International Conference, CROWNCOM 2017, Lisbon, Portugal, September 20-21, 2017, Proceedings

Research Article

Implementation of a Pseudonym-Based Signature Scheme with Bilinear Pairings on Android

  • @INPROCEEDINGS{10.1007/978-3-319-76207-4_7,
        author={Leonardo Oliveira and Victor Sucasas and Georgios Mantas and Jonathan Rodriguez},
        title={Implementation of a Pseudonym-Based Signature Scheme with Bilinear Pairings on Android},
        proceedings={Cognitive Radio Oriented Wireless Networks. 12th International Conference, CROWNCOM 2017, Lisbon, Portugal, September 20-21, 2017, Proceedings},
        proceedings_a={CROWNCOM},
        year={2018},
        month={3},
        keywords={Privacy-preserving Mobile applications Bilinear pairings},
        doi={10.1007/978-3-319-76207-4_7}
    }
    
  • Leonardo Oliveira
    Victor Sucasas
    Georgios Mantas
    Jonathan Rodriguez
    Year: 2018
    Implementation of a Pseudonym-Based Signature Scheme with Bilinear Pairings on Android
    CROWNCOM
    Springer
    DOI: 10.1007/978-3-319-76207-4_7
Leonardo Oliveira1,*, Victor Sucasas1, Georgios Mantas1, Jonathan Rodriguez1
  • 1: Instituto de Telecomunicações
*Contact email: leonardooliveira@ua.pt

Abstract

Privacy preservation is of paramount importance in the emerging smart city scenario, where numerous and diverse online services will be accessed by users through their mobile or wearable devices. In this scenario, service providers or eavesdroppers can track users’ activities, location, and interactions with other users, which may discourage citizens from accessing smart city services. Pseudonym-based systems have been proposed as an efficient solution to provide identity confidentiality, and more concretely pseudonym-based signature schemes have been suggested as an effective means to authenticate entities and messages privately. In this paper we describe our implementation of a pseudonym-based signature scheme, based on bilinear-pairings. Concretely, our implementation consists of an Android application that enables users to authenticate messages under self-generated pseudonyms, while still enabling anonymity revocation by a trusted third party in case of misbehavior. The paper presents a description of the implementation, performance results, and it also describes the use cases for which it was designed.