Implementation of a Pseudonym-Based Signature Scheme with Bilinear Pairings on Android

  • Leonardo Oliveira
  • Victor Sucasas
  • Georgios Mantas
  • Jonathan Rodriguez
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 228)


Privacy preservation is of paramount importance in the emerging smart city scenario, where numerous and diverse online services will be accessed by users through their mobile or wearable devices. In this scenario, service providers or eavesdroppers can track users’ activities, location, and interactions with other users, which may discourage citizens from accessing smart city services. Pseudonym-based systems have been proposed as an efficient solution to provide identity confidentiality, and more concretely pseudonym-based signature schemes have been suggested as an effective means to authenticate entities and messages privately. In this paper we describe our implementation of a pseudonym-based signature scheme, based on bilinear-pairings. Concretely, our implementation consists of an Android application that enables users to authenticate messages under self-generated pseudonyms, while still enabling anonymity revocation by a trusted third party in case of misbehavior. The paper presents a description of the implementation, performance results, and it also describes the use cases for which it was designed.


Privacy-preserving Mobile applications Bilinear pairings 



This work is supported by the European Structural Investment Funds, through CENTRO 2020 [Project Nr. 017785 (CENTRO-01-0247-FEDER-017785)] and EU-H2020-MSCA-ITN-2016 SECRET-722424.


  1. 1.
    Li, M., Lou, W., Ren, K.: Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1), 51–58 (2010)CrossRefGoogle Scholar
  2. 2.
    Wasef, A., Lu, R., Lin, X., Shen, X.: Complementing public key infrastructure to secure vehicular ad hoc networks [security and privacy in emerging wireless networks]. IEEE Wirel. Commun. 17(5), 22–28 (2010)CrossRefGoogle Scholar
  3. 3.
    Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). CrossRefGoogle Scholar
  4. 4.
    Huang, J.-L., Yeh, L.-Y., Chien, H.-Y.: ABAKA: an anonymous batch authenticated and key agreement scheme for value added services in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 60(1), 248–262 (2011)CrossRefGoogle Scholar
  5. 5.
    Lu, R., Lin, X., Shi, Z., Shen, X.S.: A lightweight conditional privacy-preservation protocol for vehicular traffic-monitoring systems. IEEE Intell. Syst. 28(3), 62–65 (2013)CrossRefGoogle Scholar
  6. 6.
    Zhang, Y., Chen, J.-L.: A delegation solution for universal identity management in SOA. IEEE Trans. Serv. Comput. 4(1), 70–81 (2011)CrossRefGoogle Scholar
  7. 7.
    Sucasas, V., Mantas, G., Saghezchi, F.B., Radwan, A., Rodriguez, J.: An autonomous privacy-preserving authentication scheme for intelligent transportation systems. Comput. Secur. 60, 193–205 (2016)CrossRefGoogle Scholar
  8. 8.
    Sucasas, V., Mantas, G., Radwan, A., Rodriguez, J.: An OAuth2-based protocol with strong user privacy preservation for smart city mobile e-Health apps. In: IEEE ICC (2016)Google Scholar
  9. 9.
    Sucasas, V., Mantas, G., Radwan, A., Rodriguez, J.: A lightweight privacy-preserving OAuth2-based protocol for smart city mobile apps. In: GLOBECOM Workshops (2016)Google Scholar
  10. 10.
    De Caro, A., Iovino, V. jPBC: Java pairing based cryptography. In: Proceedings of the 16th IEEE Symposium on Computers and Communications, ISCC (2011)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018

Authors and Affiliations

  1. 1.Instituto de TelecomunicaçõesAveiroPortugal

Personalised recommendations