TBSCrowd: A Blockchain-Assisted Privacy-Preserving Mobile Crowdsourcing Scheme From Threshold Blind Signatures

被引:0
作者
Liu, Jinhui [1 ,2 ]
Dong, Shunyu [1 ]
Wen, Jiaming [3 ,4 ]
Tang, Bo [1 ,2 ]
Yu, Yong [1 ,2 ]
机构
[1] Northwestern Polytech Univ, Sch Cyber Secur, Xian 710072, Peoples R China
[2] Northwestern Polytech Univ, Res & Dev Inst, Shenzhen 518057, Peoples R China
[3] Wuhan Univ, Sch Cyber Sci & Engn, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Wuhan 430072, Peoples R China
[4] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 11期
基金
中国国家自然科学基金;
关键词
Crowdsourcing; Blockchains; Security; Privacy; Task analysis; Robustness; Internet of Things; Blind signatures; blockchain; mobile crowdsourcing system; privacy preserving; security; threshold signatures; SECURITY;
D O I
10.1109/JIOT.2023.3342092
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile crowdsourcing is the practice of hiring a number of people (workers) at a low cost to complete tasks that are typically difficult to complete individually. However, in the IoT era, how to achieve lightweight privacy preservation and evaluate the trust of human mobility are crucial matters. Therefore, this article proposes a blockchain assisted privacy-preserving mobile crowdsourcing scheme based on threshold blind signatures (TBSCrowd for short). We design a blockchain assisted privacy-preserving mobile crowdsourcing scheme which can preserve security, robustness, fairness while reducing computation and communication overheads of scheme. To achieve the properties of privacy, unforgeability and robustness, we propose robust asynchronous ECC threshold signatures. Simulations are conducted to show the performance of the TBSCrowd scheme, and the experiment results demonstrate that our construction significantly outperforms some related schemes in security and other related aspects.
引用
收藏
页码:19344 / 19354
页数:11
相关论文
共 31 条
  • [1] Online panels in social science research: Expanding sampling methods beyond Mechanical Turk
    Chandler, Jesse
    Rosenzweig, Cheskie
    Moss, Aaron J.
    Robinson, Jonathan
    Litman, Leib
    [J]. BEHAVIOR RESEARCH METHODS, 2019, 51 (05) : 2022 - 2038
  • [2] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208
  • [3] Enabling the Internet of Mobile Crowdsourcing Health Things: A Mobile Fog Computing, Blockchain and IoT Based Continuous Glucose Monitoring System for Diabetes Mellitus Research and Care
    Fernandez-Carames, Tiago M.
    Froiz-Miguez, Ivan
    Blanco-Novoa, Oscar
    Fraga-Lamas, Paula
    [J]. SENSORS, 2019, 19 (15)
  • [4] Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security
    Gennaro, Rosario
    Goldfeder, Steven
    Narayanan, Arvind
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 156 - 174
  • [5] Gennaro Rosario., 2003, STOC, P417
  • [6] Ghaffaripour S, 2020, IEEE SYS MAN CYBERN, P4510, DOI [10.1109/SMC42975.2020.9283027, 10.1109/smc42975.2020.9283027]
  • [7] Theoretical design of decentralized auction framework under mobile crowdsourcing environment
    Guo, Jianxiong
    Ding, Xingjian
    Wang, Tian
    Jia, Weijia
    [J]. THEORETICAL COMPUTER SCIENCE, 2023, 939 : 250 - 260
  • [8] Haochen Yang, 2020, 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), P23, DOI 10.1109/CyberC49757.2020.00014
  • [9] A Survey on Task Assignment in Crowdsourcing
    Hettiachchi, Danula
    Kostakos, Vassilis
    Goncalves, Jorge
    [J]. ACM COMPUTING SURVEYS, 2023, 55 (03)
  • [10] Howe J., 2006, WIRED