Table 2: Comparison of SEVIL and related works.
SEVIL (Wasef and Shen, 2010) (Kim et al., 2011) (Feng et al., 2017) (Alamer, 2020) (Zhang et al., 2021)
Security and
privacy properties
Unforgeability ✓ ✓ ✓ ✓ ✓ ✓
Trust on signers ✓ ✗ ✗ ✓ ✗ ✗
Unlinkability ✓ ✓ ✗ ✗ ✓ ✓
Functional properties
Batch verification ✓ ✓ ✓ ✓ ✓ ✓
Invalid signatures identification ✓ ✗ ✓ ✗ ✗ ✗
privacy properties, through a comprehensive security
analysis. Thanks to SEVIL’s proof of concept that
fully implement the different algorithms, we show
that the aggregated verification achieves a gain of up
to 50% with regard to the naive verification of group
signatures. This gain proves the efficiency of SEVIL
and must be put into perspective as in real world
applications, verifiers are assumed to have advanced
hardware features.
ACKNOWLEDGEMENTS
Authors are thankful to Mr. Fadel Radji for im-
plementing SEVIL’s algorithms and for providing
valuable suggestions to improve the system’s perfor-
mances.
REFERENCES
Jpbc library: Bilinear pairing parameters generators. http:
//gas.dia.unisa.it/projects/jpbc/docs/ecpg.html.
Alamer, A. (2020). An efficient group signcryption scheme
supporting batch verification for securing transmitted
data in the internet of things. Journal of Ambient In-
telligence and Humanized Computing.
Belguith, S., Kaaniche, N., Mohamed, M., and Russello,
G. (2018). Coop-daab: Cooperative attribute based
data aggregation for internet of things applications.
In OTM Confederated International Conferences” On
the Move to Meaningful Internet Systems”, pages
498–515. Springer.
Bellare, M., Micciancio, D., and Warinschi, B. (2003).
Foundations of group signatures: Formal definitions,
simplified requirements, and a construction based on
general assumptions. In Biham, E., editor, Advances
in Cryptology — EUROCRYPT 2003, pages 614–629,
Berlin, Heidelberg. Springer Berlin Heidelberg.
di Vimercati, S. D. C., Foresti, S., Livraga, G., and Sama-
rati, P. (2019). Data security and privacy in the cloud.
In Agaian, S. S., Asari, V. K., and DelMarco, S. P., ed-
itors, Mobile Multimedia/Image Processing, Security,
and Applications 2019, pages 84 – 96. SPIE.
Feng, W., Yan, Z., and Xie, H. (2017). Anonymous authen-
tication on trust in pervasive social networking based
on group signature. IEEE Access, 5:6236–6246.
Ferrara, A., Green, M., Hohenberger, S., and Pedersen, M.
(2009). Practical short signature batch verification.
pages 309–324.
Groth, J. and Sahai, A. (2008). Efficient non-interactive
proof systems for bilinear groups. In Smart, N., editor,
Advances in Cryptology – EUROCRYPT 2008, pages
415–432, Berlin, Heidelberg. Springer Berlin Heidel-
berg.
Kaaniche, N., Laurent, M., and Belguith, S. (2020a). Pri-
vacy enhancing technologies for solving the privacy-
personalization paradox: Taxonomy and survey. Jour-
nal of Network and Computer Applications, page
102807.
Kaaniche, N., Masmoudi, S., Znina, S., Laurent, M., and
Demir, L. (2020b). Privacy preserving cooperative
computation for personalized web search applications.
In Proceedings of the 35th Annual ACM Symposium
on Applied Computing, page 250–258.
Kim, K., Yie, I., Lim, S., and Nyang, D. (2011). Batch
verification and finding invalid signatures in a group
signature scheme. International Journal of Network
Security, 12:229–238.
Naccache, D., M’Ra
¨
ıhi, D., Vaudenay, S., and Raphaeli, D.
(1994). Can d.s.a. be improved? complexity trade-
offs with the digital signature standard. In Advances in
Cryptology - EUROCRYPT ’94, Workshop on the The-
ory and Application of Cryptographic Techniques, Pe-
rugia, Italy, May 9-12, 1994, Lecture Notes in Com-
puter Science, pages 77–85. Springer.
Pastuszak, J., Michałek, D., Pieprzyk, J., and Seberry, J.
(2004). Identification of bad signatures in batches.
pages 28–45.
Rahali, S., Laurent, M., Masmoudi, S., Roux, C., and
Mazeau, B. (2021). A validated privacy-utility pre-
serving recommendation system with local differen-
tial privacy.
Wasef, A. and Shen, X. (2010). Efficient group signature
scheme supporting batch verification for securing ve-
hicular networks. In 2010 IEEE International Confer-
ence on Communications, pages 1–5.
Zhang, A., Zhang, P., Wang, H., and Lin, X. (2021).
Application-oriented block generation for consortium
blockchain-based iot systems with dynamic device
management. IEEE Internet of Things Journal,
8(10):7874–7888.
SECRYPT 2022 - 19th International Conference on Security and Cryptography
24