Acta Univ. Agric. Silvic. Mendelianae Brun. 2016, 64, 1785-1795

https://doi.org/10.11118/actaun201664051785
Published online 2016-10-31

System for Anonymous Data Collection Based on Group Signature Scheme

David Troják, Dan Komosný

Department of Telecommunications, Faculty of Electrical Engineering an Communication, Brno University of Technology, Technická 3082/12, 616 00, Brno, Czech Republic

References

1. CERVENKA, V., MRAZ, L. and KOMOSNY, D. 2014. Comprehensive Performance Analysis of Lightweight Mesh and Its Comparison with ZigBee Pro Technology. Wireless Personal Communications, 78(2): 1527 – 1538. <https://doi.org/10.1007/s11277-014-1832-x>
2. MRAZ, L., CERVENKA, V., KOMOSNY, D. et al. 2013. Comprehensive Performance Analysis of ZigBee Technology Based on Real Measurements. Wireless personal communications, 71(4): 2783 – 2803. <https://doi.org/10.1007/s11277-012-0971-1>
3. DE CRISTOFARO, E. and SORIENTE, C. 2013. Extended capabilities for a privacy-enhanced participatory sensing infrastructure (PEPSI). IEEE Transactions on Information Forensics and Security, 8(12): 2021 – 2033. <https://doi.org/10.1109/TIFS.2013.2287092>
4. DOMINGO-FERRER, J. and MATEO-SANZ, J. M. 2002. Practical data-oriented microaggregation for statistical disclosure control. IEEE Transactions on Knowledge and Data Engineering, 14(1): 189 – 201. <https://doi.org/10.1109/69.979982>
5. LASZLO, M. and MUKHERJEE, S. 2005. Minimum spanning tree partitioning algorithm for microaggregation. IEEE Transactions on Knowledge and Data Engineering, 17(7): 902 – 911. <https://doi.org/10.1109/TKDE.2005.112>
6. SOLANAS, A. and MARTÍNEZ-BALLESTÉ, A. 2006. V-MDAV: A Multivariate Microaggregation with Variable Group Size. In: 17th COMPSTAT Symposium of the IASC.
7. TRUTA, T. M. and VINAY, B. 2006. Privacy protection: P-sensitive k-anonymity property. In: 22nd International Conference on Data Engineering Workshops (ICDEW’06), 94.
8. MACHANAVAJJHALA, A., KIFER, D., GEHRKE, J. et al. 2007. L-diversity. ACM Transactions on Knowledge Discovery from Data, 1(1): 3 – es.
9. KAPADIA, A., TRIANDOPOULOS, N., CORNELIUS, C. et al. 2008. AnonySense: Opportunistic and privacy‑preserving context collection. In: Lecture Notes in Computer Science. Springer Science + Business Media, 280 – 297.
10. HAJNY, J. and MALINA, L. 2013. Unlinkable attribute-based credentials with practical revocation on smart‑cards. In: Smart Card Research and Advanced Applications. Springer Science + Business Media, 62 – 76.
11. PANG, S., KOMOSNY, D., ZHU, L., et al. 2016. Malicious Events Grouping via Behavior Based Darknet Traffic Flow Analysis. Wireless Personal Communications, in print.
12. ZHANG, R., ZHU, L., LI, X. et al. 2015. Behavior Based Darknet Traffic Decomposition for Malicious Events Identification. In: Lecture Notes in Computer Science. Springer Science + Business Media, 251 – 260.
13. SIMEK, M., MORAVEK, P., KOMOSNY, D. et al. 2012. Distributed Recognition of Reference Nodes for Wireless Sensor Network Localization. In: Radioengineering, 21(1): 89 – 98.
14. MORAVEK, P., KOMOSNY, D. and SIMEK, M. 2012. Multilateration and Flip Ambiguity Mitigation in Ad-hoc Networks. In: Przeglad Elektrotechniczny, 2012(05b): 222 – 229.
15. TANG, K.P., KEYANI, P., FOGARTY, J. et al. 2006. Putting people in their place. In: Proceedings of the SIGCHI conference on Human Factors in computing systems – CHI ’06. 93102.
16. BELLARE, M., MICCIANCIO, D. and WARINSCHI, B. 2003. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In: Advances in Cryptology – EUROCRYPT 2003. Springer Science + Business Media, 614 – 629.
17. CHAUM, D. and HEYST, E. V. 1991. Group Signatures. In: Advances in Cryptology – EUROCRYPT 91. Lecture Notes in Computer Science. 257 – 265.
18. ATENIESE, G., CAMENISCH, J., JOYE, M. et al, G. 2000. A Practical and Provably Secure Coalition‑Resistant Group Signature Scheme. In: Advances in Cryptology — CRYPTO 00. Lecture Notes in Computer Science. 255 – 270.
19. BONEH, D., BOYEN, X. and SHACHAM, H. 2004. Short Group Signatures. In: Advances in Cryptology – CRYPTO 04. Lecture Notes in Computer Science. 41 –55.
20. NGUYEN, L. and SAFAVI-NAINI, R. 2004. Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings. In: Advances in Cryptology – ASIACRYPT 04. Lecture Notes in Computer Science. 372 –386.
21. MALINA, L., HAJNY, J. and ZEMAN, V. 2013. Trade-off between signature aggregation and batch verification. In: Telecommunications and Signal Processing. 36th International Conference on. IEEE.
front cover

ISSN 1211-8516 (Print)

ISSN 2464-8310 (Online)

Current issue

Review Management System NEW Indexed in DOAJ

Archive