This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

11institutetext: College of Information Engineering, Nanjing University of Finance and Economics, Nanjing, China
11email: [email protected], [email protected]
22institutetext: Jiangsu Provincial Key Laboratory of E-Business, Nanjing University of Finance and Economics, Nanjing, China
22email: [email protected]
33institutetext: College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China 44institutetext: Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, China
44email: [email protected]
55institutetext: School of Cyber Science and Engineering, Southeast University, Nanjing, China
55email: [email protected]

A Privacy-Preserving Logistics Information System with Traceability

Quanru Chen 11    Jinguang Han 2(2())    Jiguo Li 3344    Liquan Chen 55    Song Li 11
Abstract

Logistics Information System (LIS) is an interactive system that provides information for logistics managers to monitor and track logistics business. In recent years, with the rise of online shopping, LIS is becoming increasingly important. However, since the lack of effective protection of personal information, privacy protection issue has become the most problem concerned by users. Some data breach events in LIS released users’ personal information, including address, phone number, transaction details, etc. In this paper, to protect users’ privacy in LIS, a privacy-preserving LIS with traceability (PPLIST) is proposed by combining multi-signature with pseudonym. In our PPLIST scheme, to protect privacy, each user can generate and use different pseudonyms in different logistics services. The processing of one logistics is recorded and unforgeable. Additionally, if the logistics information is abnormal, a trace party can de-anonymize users, and find their real identities. Therefore, our PPLIST efficiently balances the relationship between privacy and traceability.

Keywords:
Privacy Protection Multi-signature Pseudonym Traceability Logistics Information System.

1 Introduction

In recent years, with the rapid development of e-commerce, online shopping has become a popular trend. Online shopping is an interactive activity between a buyer and a seller, where after completing an order by a buyer, the product is delivered via a logistics system [26]. Logistics system helps to reduce product cost and save shopping time.

Unfortunately, the current LISs [33] cannot effectively protect users’ privacy information. Users’ personal information is clearly visible on the express bill and the LIS database [48]. Some data breaches in LISs released users’ personal information, including addresses, phone numbers, transaction details, etc. If a user’s personal information is leaked and maliciously collected, she may be at high risk of identity forgery and property fraud, in addition to the risk of being harassed by spam messages. Therefore, it is interesting and important to consider the privacy issues in LISs.

Furthermore, since a product is delivered by multiple logistics stations, it is important to record the whole logistics process and make the process unforgeable. Additionally, to prevent users from conducting illegal transactions, users can be de-anonymized [35, 42] and traced.

In this paper, we propose a privacy-preserving logistics information system with traceability (PPLIST). Compared with the existing LISs, our scheme has the following advantages:

  1. 1)

    Users can anonymously use the logistics services in our PPLIST scheme. Users generate and use different pseudonyms in different logistics services. Even the internal staff of a logistics company can not directly obtain the information of users’ identities, our PPLIST effectively protects users’ personal information.

  2. 2)

    In the case that the identity of a user needs to be released, a trace party can de-anonymize a user and find his identity. This properties prevent users from conducting illegal logistics via a logistics system.

  3. 3)

    Our PPLIST scheme is efficient. Multi-signature is applied to record the delivery process and reduces the storage space.

Contributions:

Our main contributions in this paper are summarised as follows: 1) The definition and security model of our PPLIST scheme are formalised; 2) A PPLIST scheme is formally constructed; 3) The security of our PPLIST scheme is formally reduced to well-known complexity assumptions; 4) Our PPLIST scheme is implemented and evaluated.

1.1 Related Work

In this subsection, we introduce the work which is related to our PPLST scheme, including LIS, privacy protection in LIS, multi-signature and pseudonym.

1.1.1 Logistics Information System

LIS is a subsystem and the nerve center of logistics systems. As the control center of the whole logistics activities, LIS has many functions. The main functions of LIS are as follows: collect, store, transmit, process, maintain and output logistics information; provide strategic decision support for logistics managers; improve the efficiency of logistics operations [28].

Bardi et al. [6] pointed out that the choice of LIS directly affected the logistics cost and customer-service level. Lai et al. [27] showed that LISs is very important for a company to manage product inventory and predict the trend of customers’ online shopping. In addition, Ngai et al. [37] claimed that LIS is an information system that can promote a good communication between the companies and the customers. An LIS adoption model was proposed in [37] to examine the relationship among organizational environment, perceived benefits and perceived barriers of LIS adoption. In [15], Closs and Xu argued that the important source of enterprise competitive advantages was logistics information technology. Their research showed that companies with advanced logistics information technology and LIS performed better than other companies.

LISs have been proposed and applied into various application scenarios [1, 2]. Amazon [1] is one of the first companies to provide e-commerce services. Amazon has a logistics system, which realizes the organization and operation of the whole logistics activities. Amazon has also added special technology, One-Click [14], in their LIS, which can automatically store the information of customers. Therefore, customers do not input their person information in each shopping. In addition, Amazon’s LIS has the following functions [16]: order confirmation in time, smooth logistics process, accurate inventory information and optional logistics methods, etc. Amazon has become a business to consumer (B2C) e-commerce [25] company.

Taobao [2] is a consumer to consumer (C2C) e-commerce [51] platform. Taobao entrusts all logistics activities to a third party logistics company, but takes a series of measures to ensure the security of logistics activities. For instance, Taobao implements the network real-name system (NRS) [43] in their LIS, and has set up a special customer-service department to solve products logistics problems. Besides, Taobao has the functions of timely confirmation of orders and delivery within the specified time.

1.1.2 Privacy Protection in LIS

Although the LIS of e-commerce platform brings convenience to people’s life, it also brings great challenges to privacy protection. LIS stores a large number of users’ personal information. Once the information is leaked, it will result in serious threaten to the life and safety of users. Some privacy protection methods in LIS have been proposed, such as [17, 32, 41, 29, 45, 47, 49]. We compare our scheme with these systems in Table 1.

Léauté et al. [32] proposed a scheme to ensure the privacy of users while minimizing the cost of logistics operation. The scheme formalizes the problem as a Distributed Constraint Optimization Problem (DCOP) [19], and combines various techniques of cryptography. But the disadvantage of this scheme [32] is that the anonymization of users is not considered. In [49], Frank et al. proposed a set of protocols for tracking logistics information, which is a light-weight privacy protection mechanism.

To solve the problem of privacy leakage caused by stolen express order number, Wei et al. [47] proposed a k-anonymous model to protect logistics information. However, the method only protects a part of users’ personal information, because the names and telephone numbers of receivers are directly printed on the express bills for delivery.

To improve the security of [47], Qi et al. [41] proposed a new logistics management scheme based on encrypted QR code [45]. After a courier scans the encrypted QR code by using an APP, the logistics information of products in the database is automatically updated through GPRS or Wi-Fi. The APP provides an optimal delivery route for couriers. However, the problem of [41] is that users’ personal information is still visible to the internal staff of express companies. In addition, Laslo et al. [45] proposed a traceable LIS based on QR code. However, this scheme does not consider privacy protection.

Furthermore, Gao et al. [17] proposed a secure LIS, named LIP-PA, which can protect the logistics process information between different logistics stations, but the protection of users’ personal information is not considered well. Hence, the privacy of users in LISs [17, 41, 45] was not fully considered.

Liu et al. [29] designed an LIS based on the Near Field Communication (NFC) [50] technology. In [29], users’ personal information was hidden in tags, and only authorized people can access information. However, because of the limitation of computation power, the scheme cannot perform complex encryption and decryption processes.

In summary, above schemes addressed the privacy issues in LIS, but these schemes did not consider the track of delievery process and the trace of illegal users. However, these are important issues in LISs. Therefore, to solve these problems, we propose a new privacy-preserving LIS called PPLIST.

Table 1: The Comparison between Our Scheme and Related Schemes
Systems Anonymity Traceability Security Proof
Gao et al.[17] ×\times ×\times
Léauté et al.[32] ×\times ×\times
Qi et al.[41] ×\times ×\times
Liu et al.[29] ×\times
Laslo et al.[45] ×\times ×\times
Wei et al.[47] ×\times ×\times
Frank et al.[49] ×\times ×\times
Our PPLIST

1.1.3 Multi-Signature

Multi-signature, also called multi-digital signature, is an important branch of digital signature. Multi-signature is suitable to the case where multiple users sign on a message, and a verifier is convinced that each user participated in the signing [8].

Itakura [23] first proposed the concept of multi-signature, and proposed a multi-signature scheme with fixed number of signatures. Then, many multi-signature schemes were proposed [7, 22, 34, 39, 38, 40]. The multi-signature generation time of schemes [23, 40] is linear with the number of signers. Okamoto et al. [38] proposed a muti-signature scheme, but it, like scheme [39], only allows each signer in a group to sign the message. It’s inflexible. Furthermore, Ohta and Okamoto [39] formlized the security model of multi-signature. However, this scheme did not consider the security of the key generation process, so its security is not strong. Based on [39], Micali et al. [34] proposed a formal and strong security model for multi-signature. Bellare and Neven [7] proposed a new scheme and proved its secure in the plain public-key model. This scheme improved the efficiency of previous multi-signature schemes.

Since it enables multiple signers to collabratively sign on a message, multi-signature has been used into various application scenarios, such as [36, 46, 4, 9]. Shacham [30] proposed a sequential aggregate multi-signature scheme. The scheme computed the final multi-signature by sequentially aggregating the signatures from multiple signers. However, the data transmission of [30] is large. To solve this problem, Neven [36] presented a new sequential aggregate multi-signature scheme based on [30]. The scheme of [36] reduces signing and verification costs effectively.

Tiwari et al. [46] proposed a secure multi-proxy multi-signature scheme. It does not need paring operations, and reduces the running time. The scheme is aslo secure against the attack of selected messages. However, Asaar et al.[4] found the scheme in [46] is insecure, and proposed an identity-based multi-proxy and multi-signature scheme without pairing. The security of this scheme was reduced to the RSA assumption in the random oracle model by using the Forking Lemma technique [5].

Recently, Dan et al.[9] proposed a new multi-signature scheme. Signature compression and public-key aggregation were used in the scheme. Therefore, when a group of signers signed a message, the verifier only needs to verify the final aggregate signature. The advantage of this scheme is that the size of final aggregate signature is constant and independent of the number of signers. Furthermore, this scheme is secure against rogue-key attacks. When constructing our PPLIST, we apply the scheme [9] to record the whole logistics process and reduces the storage cost.

1.1.4 Pseudonym

Pseudonym is a method that allows users to interact anonymously with other organizations. Because pseudonym is unlinkable, it can effectively protect the information of a user’s identity [44] among multiple authentications. The common pseudonym generation techniques are as follows [13]: 1) Encryption with public key; 2) Hash function; 3) Keyed-hash function with stored key; 4) Tokenization.

Chaum [10] found that pseudonym enables users to work anonymously with multiple organizations, and users can use different pseudonyms in different organizations. Because of the unlinkability of pseudonym, no organization can link a user’s pseudonyms to her identities. Later, Chaum and Evertse [11] presented a pseudonym model scheme based on RSA. However, the scheme needs a trusted center to complete the sign and transfer of all users’ credentials.

To reduce the trust on the trusted center, Chen [12] proposed a scheme based on the discrete logarithm assumption. The scheme also needs a trusted center, but the trusted center is only required for pseudonym verification. Although Chen’s scheme is less dependent on the trusted center than the scheme [11], the trusted center was still required.

In order to enable users to have the initiative in the pseudonym system, Lysyanskaya et al. [31] proposed a new scheme. In this scheme, a user’s master secret key was introduced. If the master secret keys are different, the information of users’ identities must be different. In addition, the pseudonym certificate submitted by a user to an organization only corresponds to the user’s master public key and does not disclose the information of his master secret key.

Pseudonym has been applied in some schemes [20, 24] to protect users’ privacy. To reduce the communication cost of traditional pseudonym systems in Internet of Vehicles, Kang et al. [24] proposed a privacy-preserved pseudonym scheme. In this scheme, the network edge resources were used for effective management, and the communication cost was effectively reduced.

In [20], Han et al. proposed an anonymous single sign-on (ASSO) scheme. In this scheme, pseudonym was applied to protect users’ identities. A user uses his secret key to generate different pseudonyms, and obtains a ticket from a ticket issuer anonymously without releasing anything about his real identity. Furthermore, a user can use different pseudonyms to buy different tickets and the ticket issuer cannot know whether two tickets are for the same user or two different users. In our PPLIST scheme, to protect users’ privacy, we apply the pseudonym developed in [20] to enable users to use logistics services anonymously and unlinkably.

1.2 Paper Organisation

The remainder of this paper is organised as follows. Section 2 presents the preliminaries used in our scheme, and describes the formal definition and security model of our PPLIST scheme. Section 3 provides the construction of our scheme. The security proof and implementation of our scheme are presented in Section 4 and Section 5, respectively. Finally, Section 6 concludes this paper.

2 Preliminaries

In this section, the preliminaries used throughout this paper are introduced, including bilinear group, complexity assumptions, formal definition and security model. Table 2 summaries the notations used in this paper

Table 2: Notation Summary
Notation Explanation Notation Explanation
1l1^{l} A security parameter Pseudonym The pseudonym of UU
SiS_{i} The i-th logistics station PUBPUB Public parameters
UU User PPT Probable polynomial-time
TT The trace party (1l)\mathscr{B}(1^{l}) A bilinear group generator
YA The aggregation of AgYAgY xRXx\stackrel{{\scriptstyle R}}{{\leftarrow}}X x is randomly selected from XX
AgY A set of selected public keys H1,H2,H3H_{1},H_{2},H_{3} Cryptographic hash functions
σ\sigma The aggregation of signatures SigiSig_{i} The i-th single signature
π\pi The proof of user’s ownership I A set consisting of the indexes
d The number of elements in II of selected logistics stations
q A prime number

The framework of our PPLIST is presented in Fig. 1. The system first generates the public parameters PUBPUB. Then, each entity (e.g. logistics station, user and the trace party) generates its secret-public key pair. Prior to ordering a service, the user generates a pseudonym by using his secret key. The system determines the delivery path, and then generates the aggregated public key of the selected logistics stations. After that, each selected logistics station SiS_{i} generates its single signature SigiSig_{i} on the product information, pseudonym and aggregated public key, and then passes it to the next selected logistics station. Finally, the last selected logistic station generates its signature and the aggregate signature σ\sigma. To obtain a product, the user needs to prove that he is the owner by generating a proof of the knowledge included in the pseudonym. The user can verify whether the product is delivered correctly by checking the aggregate signature σ\sigma. In the case that the identity of a user needs to be traced, the trace party can use his secret key to de-anonymous the pseudonym, and find the user’s identity.

Refer to caption
Figure 1: The Framework of Our PPLIST Scheme

2.1 Bilinear Group

Let G1,G2,GιG_{1},G_{2},G_{\iota} be cyclic groups with prime order qq. A map e:G1×G2Gιe:G_{1}\times G_{2}\rightarrow G_{\iota} is a bilinear map if it satisfies the following properties: (1) Bilinearity: For all gG1g\in G_{1}, hG2h\in G_{2}, a,bZqa,b\in Z_{q}, e(ga,hb)=e(gb,ha)=e(g,h)abe(g^{a},h^{b})=e(g^{b},h^{a})=e(g,h)^{ab}; (2) Non-degeneration: For all gG1g\in G_{1}, hG2h\in G_{2}, e(g,h)1ιe(g,h)\not=1_{\iota}, where 1ι1_{\iota} is the identity element in GιG_{\iota}; (3) Computability: For all gG1g\in G_{1}, hG2h\in G_{2}, there exists an efficient algorithm to compute e(g,h)e(g,h).

Let (1l)(e,q,G1,G2,Gι)\mathscr{B}(1^{l})\rightarrow(e,q,G_{1},G_{2},G_{\iota}) be a bilinear group generator which takes as input a security parameter 1l1^{l} and outputs a bilinear group (e,q,G1,G2,Gι)(e,q,G_{1},G_{2},G_{\iota}).

A function ϵ(x)\epsilon(x) is negligible if for any kNk\in N, there exist a zNz\in N such that ϵ(x)<1xz\epsilon(x)<\frac{1}{x^{z}} when x>zx>z.

2.2 Complexity Assumptions

Definition 1 (Computational Diffie-Hellman (CDH) Assumption [21])

Let (1l)(e,q,G1,G2,Gι)\mathscr{B}(1^{l})\rightarrow(e,q,G_{1},G_{2},G_{\iota}), and g1,g2g_{1},g_{2} be generator of G1,G2G_{1},G_{2}, respectively. Suppose that α,βRZq\alpha,\beta\stackrel{{\scriptstyle R}}{{\leftarrow}}Z_{q}. Given a triple (g1α,g1β,g2β)(g^{\alpha}_{1},g^{\beta}_{1},g^{\beta}_{2}), we say that the CDHCDH assumption holds on (e,q,G1,G2,Gι)(e,q,G_{1},G_{2},G_{\iota}) if all PPTPPT adversaries 𝒜\mathcal{A} can output g1αβg^{\alpha\beta}_{1} with a negligible advantage, namely Adv𝒜CDH=PR[𝒜(g1α,g1β,g2β)g1αβ]ϵ(l)Adv_{\mathcal{A}}^{CDH}=PR[\mathcal{A}(g^{\alpha}_{1},g^{\beta}_{1},g^{\beta}_{2})\rightarrow g^{\alpha\beta}_{1}]\leq\epsilon(l).

Definition 2 (Discrete Logarithm (DL) Assumption [18])

Let GG be a cyclic group with prime order qq, and gg be a generator of GG. Given YGY\in G, we say that the DLDL assumption holds on GG if all PPTPPT adversaries can output a number xZqx\in Z_{q} such that Y=gxY=g^{x} with a negligible advantage, namely Adv𝒜DL=PR[Y=gx|𝒜(q,g,G,Y)x]ϵ(l)Adv_{\mathcal{A}}^{DL}=PR[Y=g^{x}|\mathcal{A}(q,g,G,Y)\rightarrow x]\leq\epsilon(l).

2.3 Formal Definition

A PPLIST scheme is formalized by the following eight algorithms:

Setup(1l)PUB.Setup(1^{l})\rightarrow PUB.

The algorithm takes the security parameters 1l1^{l} as input and outputs the public parameters PUBPUB.

KeyGeneration.Key-Generation.

This algorithm consists of the following sub-algorithms:

  • 1)

    StationKeyGeneration(1l)(SKSi,PKSi).Station-Key-Generation(1^{l})\rightarrow(SK_{S_{i}},PK_{S_{i}}). This algorithm is executed by each logistics station SiS_{i}. SiS_{i} takes the security parameters 1l1^{l} as input, and outputs his secret-public key pair (SKSi,PKSi)(SK_{S_{i}},PK_{S_{i}}), where i=1,2,3,,ni=1,2,3,\cdots,n.

  • 2)

    UserKeyGeneration(1l)(SKU,PKU).User-Key-Generation(1^{l})\rightarrow(SK_{U},PK_{U}). This algorithm is executed by a user UU. UU takes the security parameters 1l1^{l} as input, and outputs his secret-public key pair (SKU,PKU)(SK_{U},PK_{U}).

  • 3)

    TraceKeyGeneration(1l)(SKT,PKT).Trace-Key-Generation(1^{l})\rightarrow(SK_{T},PK_{T}). This algorithm is executed by a trace party TT. TT takes the security parameters 1l1^{l} as input, and outputs his secret-public key pair (SKT,PKT)(SK_{T},PK_{T}).

UserPseudonym(PUB,SKU,PKT)Pseudonym.User-Pseudonym(PUB,SK_{U},PK_{T})\rightarrow Pseudonym.

This algorithm is executed by UU. UU takes as input his secret key SKUSK_{U}, the public key PKTPK_{T} of the trace party and the public parameters PUBPUB, and outputs a pseudoym PseudonymPseudonym.

PublicKeyAggregation(PUB,PKSk1,PKSk2,PKSkd)YA.Public-Key-Aggregation(PUB,PK_{S_{k_{1}}},PK_{S_{k_{2}}}\cdots,PK_{S_{k_{d}}})\rightarrow YA.

Let II be a set which consists of the indexes of some selected logistics stations. This algorithm takes as input the public parameters PUBPUB and the public keys PKSk1,PKSk2,PK_{S_{k_{1}}},\\ PK_{S_{k_{2}}}, ,PKSkd\cdots,PK_{S_{k_{d}}} of selected logistics stations, and outputs the aggregated public key YAYA.

Sign.Sign.

This algorithm consists of the following sub-algorithms:

  • 1)

    SingleStationSign(PUB,SKSki,Pseudonym,YA,m)Sigi.Single-Station-Sign(PUB,SK_{S_{k_{i}}},Pseudonym,YA,m)\rightarrow Sig_{i}. This algorithm is executed by each selected logistics station SkiS_{k_{i}}. SkiS_{k_{i}} takes as input its secret key SKSkiSK_{S_{k_{i}}}, the aggregated public key YAYA, product information mm and the public parameters PUBPUB, and outputs a signature SigiSig_{i}, where i=1,2,3,,di=1,2,3,\cdots,d.

  • 2)

    SignAggregation(PUB,Sig1,Sig2,,Sigd)σ.Sign-Aggregation(PUB,Sig_{1},Sig_{2},\cdots,Sig_{d})\rightarrow\sigma. This algorithm takes as input the public parameters PUBPUB and signatures SigiSig_{i}, and outputs a final signature σ\sigma.

UserOwnershipVerify(PUB,SKU,PKT,Pseudonym)Si(PUB)(π,1/0).User-Ownership-Verify(PUB,SK_{U},PK_{T},Pseudonym)\leftrightarrow S_{i}(PUB)\rightarrow(\pi,1/0).

This algorithm is executed between SiS_{i} and UU.

  • 1)

    UU takes as input his secret key SKUSK_{U}, the TsT^{\prime}s public key PKTPK_{T}, his pseudonym PseudonymPseudonym and the public parameters PUBPUB, and outputs a proof π\pi.

  • 2)

    The verifier takes as input the public parameters PUBPUB, and outputs 11 if the proof π\pi is valid; otherwise, it outputs 0 to show the proof is invalid.

Verify(PUB,σ,Pseudonym,YA,m)1/0.Verify(PUB,\sigma,Pseudonym,YA,m)\rightarrow 1/0.

This algorithm takes as input the public parameters PUBPUB, the final signature σ\sigma, the pseudonym PseudonymPseudonym, the aggregated public key YAYA and product information mm, and outputs 11 if signature is valid; otherwise, it outputs 0 to show it is an invalid signature.

Trace(PUB,σ,SKT,Pseudonym,YA,m)PKU/.Trace(PUB,\sigma,SK_{T},Pseudonym,YA,m)\rightarrow PK_{U}/\bot.

This algorithm is executed by TT. TT takes as input his secret key SKTSK_{T}, the pseudonym PseudonymPseudonym, the aggregated public key YAYA, the final signature σ\sigma, product information mm and the public parameters PUBPUB, and outputs UsU^{\prime}s public key PKUPK_{U} if the signature σ\sigma is valid; otherwise, it outputs \bot to show failure.

2.4 Security Requirements

The security model of our scheme is defined by the following two games.

2.4.1 Unforgeability.

This is used to define the unforgeability of signature, namely even if users, the trace party and the other stations collude, they cannot forge a valid signature on behalf of the selected logistics stations. This game is executed between a challenger 𝒞\mathcal{C} and a forger \mathcal{F}.

Setup.

𝒞\mathcal{C} runs Setup(1l)PUBSetup(1^{l})\rightarrow PUB and sends PUBPUB to \mathcal{F}.

Key-Generation Query.
  1. 1)

    \mathcal{F} asks the public key of stations. 𝒞\mathcal{C} runs StationKeyGeneration(1l)(SKSi,PKSi)Station-Key-Generation(1^{l})\rightarrow(SK_{S_{i}},PK_{S_{i}}) and sends the station’s public key PKSiPK_{S_{i}} to \mathcal{F}.

  2. 2)

    When \mathcal{F} asks a urse’s secret-public key pair, 𝒞\mathcal{C} runs UserKeyGeneration(1l)(SKU,PKU)User-Key-Generation\\ (1^{l})\rightarrow(SK_{U},PK_{U}) and sends (SKU,PKU)(SK_{U},PK_{U}) to \mathcal{F}. Let GPUGPU be a set of users’ public key.

  3. 3)

    When \mathcal{F} asks the secret-public key of the trace party, 𝒞\mathcal{C} runs TraceKeyGeneration(1l)(SKT,PKT)Trace-Key-Generation(1^{l})\rightarrow(SK_{T},PK_{T}) and sends (SKT,PKT)(SK_{T},PK_{T}) to \mathcal{F}.

User-Pseudonym Query.

\mathcal{F} submits a SKUSK_{U} and the public key PKTPK_{T} of the trace party, 𝒞\mathcal{C} runs UserPseudonym(PUB,SKU,PKT)PseudonymUser-Pseudonym(PUB,SK_{U},PK_{T})\rightarrow Pseudonym and sends PseudonymPseudonym to \mathcal{F}. Let UPQUPQ be a set of pseudonyms of users.

Public-Key-Aggregation Query.

Let II be a set which consists of the indexes of some selected logistics stations and let dd be the number of elements in the set II. \mathcal{F} submits a group of selected stations’ public keys. 𝒞\mathcal{C} runs PublicKeyAggregation(PUB,PKSki)YAPublic-Key-Aggregation(PUB,PK_{S_{k_{i}}})\rightarrow YA, where i=1,2,,di=1,2,\cdots,d. 𝒞\mathcal{C} returns YAYA to \mathcal{F}.

Sign Query.

\mathcal{F} adaptively submits selected station’s secret key SKSkiSK_{S_{k_{i}}}, the aggregation of public key YAYA, and UsU^{\prime}s pseudonym PseudonymPseudonym and the product information mm to ask for a single signature SigiSig_{i} up to ϱ\varrho times.

Output.

\mathcal{F} outputs a forged signature SigiSig_{i}^{{}^{\prime}}, a final signature σ\sigma^{{}^{\prime}}, UsU^{\prime}s pseudonym PseudonymPseudonym and the product information mm^{\prime}, the public keys of selected logistics stations AgYAgY and the aggregated public keys YAYA^{{}^{\prime}}. \mathcal{F} wins the game if PKSiAgYPK_{S_{i}}\in AgY, \mathcal{F} has not conducted signature query on the message mm^{\prime}, and Verify(PUB,σ,Pseudonym,YA,m)=1Verify(PUB,\sigma^{{}^{\prime}},Pseudonym,YA^{{}^{\prime}},m^{\prime})=1.

Definition 3

A privacy-preserving logistics information system with traceability is (ϱ,ϵ(l))(\varrho,\epsilon(l)) unforgeable if all probabilistic polynomial-time (PPT) forger \mathcal{F} who makes ϱ\varrho signature queries can only win the above game with a negligible advantage, namely

Adv=Pr[Verify(PUB,σ,Pseudonym,YA,m)=1]ϵ(l)Adv=Pr\Bigg{[}Verify(PUB,\sigma^{{}^{\prime}},Pseudonym,YA^{{}^{\prime}},m^{\prime})=1\Bigg{]}\leq\epsilon(l) (1)

2.4.2 Traceability.

This is used to formalise the traceability of our scheme, namely an attacker 𝒜\mathcal{A} cannot frame a user who did not use the logistics services. We suppose that at least one station is honest. This game is executed between a challenger 𝒞\mathcal{C} and an attacker 𝒜\mathcal{A}.

Setup.

𝒞\mathcal{C} runs Setup(1l)PUBSetup(1^{l})\rightarrow PUB and sends PUBPUB to 𝒜\mathcal{A}.

Key-Generation Query.
  1. 1)

    𝒜\mathcal{A} can ask for the public key of each station. 𝒞\mathcal{C} runs StationKeyGeneration(1l)(SKSi,PKSi)Station-Key-Generation(1^{l})\rightarrow(SK_{S_{i}},PK_{S_{i}}) and sends the station’s public key PKSiPK_{S_{i}} to \mathcal{F}.

  2. 2)

    When 𝒜\mathcal{A} asks a urse’s secret-public key pair, 𝒞\mathcal{C} runs UserKeyGeneration(1l)(SKU,PKU)User-Key-Generation\\ (1^{l})\rightarrow(SK_{U},PK_{U}). Let the secret-public key pair of UU^{*} be (SKU,PKU)(SK_{U^{*}},PK_{U^{*}}). 𝒞\mathcal{C} sends other users’ secret-public key pair (SKU,PKU)(SK_{U},PK_{U}) and PKUPK_{U^{*}} to 𝒜\mathcal{A}. Let GPUGPU be a set consisting of users’s public keys.

  3. 3)

    When 𝒜\mathcal{A} asks the secret-public key pair of the trace party, 𝒞\mathcal{C} runs TraceKeyGeneration(1l)(SKT,PKT)Trace-Key-Generation(1^{l})\rightarrow(SK_{T},PK_{T}) and sends (SKT,PKT)(SK_{T},PK_{T}) to 𝒜\mathcal{A}.

User-Pseudonym Query.

𝒜\mathcal{A} submits a user’s SKUSK_{U} and the public key PKTPK_{T} of the trace party, 𝒞\mathcal{C} runs UserPseudonym(PUB,SKU,PKT)PseudonymUser-Pseudonym(PUB,SK_{U},PK_{T})\rightarrow Pseudonym and sends PseudonymPseudonym to 𝒜\mathcal{A}. Let UPQUPQ be a set of pseudonyms of users.

Public-Key-Aggregation Query.

Let II be a set which consists of the indexes of some selected logistics stations and let dd be the number of elements in the set II. 𝒜\mathcal{A} submits a group of selected stations’ public keys. 𝒞\mathcal{C} runs PublicKeyAggregation(PUB,PKSki)YAPublic-Key-Aggregation(PUB,PK_{S_{k_{i}}})\rightarrow YA, where i=i,2,,di=i,2,\cdots,d. 𝒞\mathcal{C} returns YAYA to 𝒜\mathcal{A}.

Sign Query.

𝒜\mathcal{A} adaptively submits a selected station’s secret key SKSkiSK_{S_{k_{i}}}, the aggregation of public key YAYA, and UsU^{\prime}s pseudonym PseudonymPseudonym and the product information mm to ask for a single signature SigiSig_{i} up to ϱ\varrho times.

Output.

𝒜\mathcal{A} outputs a tuple (σ,Pseudonym,YA,m)(\sigma^{\prime},Pseudonym^{{}^{\prime}},YA^{\prime},m^{\prime}). 𝒜\mathcal{A} wins the game if Trace(PUB,σ,SKT,Pseudonym,YA,m)PKUTrace(PUB,\sigma^{{}^{\prime}},SK_{T},Pseudonym^{{}^{\prime}},YA^{\prime},m^{\prime})\rightarrow PK_{U^{*}}^{{}^{\prime}} with PKUGPUPK_{U^{*}}^{{}^{\prime}}\notin GPU or PKUPKUGPUPK_{U^{*}}^{{}^{\prime}}\not=PK_{U^{*}}\in GPU.

Definition 4

A privacy-preserving logistics information system with traceability is (ϱ,ϵ(l))(\varrho,\epsilon(l)) traceable if all probabilistic polynomial-time (PPT) adversary 𝒜\mathcal{A} who makes ϱ\varrho signature queries can only win the above game with a negligible advantage, namely

Adv=Pr[PKUGPUorPKUPKUGPUTrustedPartyTrace(PUB,σ,SKT,Pseudonym,YA,m)PKU]ϵ(l)\begin{array}[]{c|c}Adv=Pr\Bigg{[}\begin{array}[]{c}PK_{U^{*}}^{{}^{\prime}}\notin GPU\ or\\ PK_{U^{*}}^{{}^{\prime}}\not=PK_{U^{*}}\in GPU\end{array}&\begin{array}[]{c}Trusted-Party-Trace\\ (PUB,\sigma^{{}^{\prime}},SK_{T},Pseudonym^{{}^{\prime}},\\ YA^{\prime},m^{\prime})\rightarrow PK_{U^{*}}^{{}^{\prime}}\end{array}\Bigg{]}\leq\epsilon(l)\end{array} (2)

3 Construction of Our Scheme

In this section, we introduce the construction of our scheme. We firstly present a high-level overview, and then describe the formal construction of our scheme.

3.1 High-Level Overview

The high-level overview of our scheme is as follows.

Setup.

The system generates the corresponding public parameters PUBPUB.

Key-Generation.

Suppose that there are nn logistics stations. Each SiS_{i}, UU and TT generate their secret-public key pairs (xsi,Ysi)(x_{s_{i}},Y_{s_{i}}), (xu,Yu)(x_{u},Y_{u}) and (xt,Yt)(x_{t},Y_{t}), where i=1,2,3,,ni=1,2,3,\cdots,n.

User-Pseudonym.

In order to protect privacy in a delivery process, UU generates a pseudonym PseudonymPseudonym by using his secret key SKUSK_{U} and TsT^{\prime}s public key PKTPK_{T}.

Public-Key-Aggregation.

According to product information, the system determines the logistics process by selecting a set of logistics stations Sk1,Sk2,,SkdS_{k_{1}},S_{k_{2}},\cdots,S_{k_{d}}. Let AgY={YSk1,YSk2,,YSkd}AgY=\big{\{}Y_{S_{k_{1}}},Y_{S_{k_{2}}},\cdots,Y_{S_{k_{d}}}\big{\}} be a set consisting of the public keys of the selected logistics stations. For each service, a table TableTable is built to record its delivery information. The system uses the public key of each SkiS_{k_{i}} and the set AgYAgY to generate hih_{i} to resist the rogue key attacks, where i=1,2,3,,di=1,2,3,\cdots,d. Then, the system generates the aggregated public key YAYA.

Sign.

Each selected logistics station SkiS_{k_{i}} uses his secret key xskix_{s_{k_{i}}} to generate a signature SigiSig_{i} on UsU^{\prime}s pseudonym PseudonymPseudonym and the product information mm, and sends SigiSig_{i} to the next logistics stations. Finally, the last logistic station SkdS_{k_{d}} use his secret key xkdx_{k_{d}} to generate a single signature SigdSig_{d} on UsU^{\prime}s pseudonym PseudonymPseudonym and the producte information mm, and compute the aggregated signature σ=i=1dSigi\sigma=\prod_{i=1}^{d}Sig_{i}. SkdS_{k_{d}} also adds σ\sigma to the table TableTable.

User-Ownership-Verify.

When UU proves to the last logistic station SkdS_{k_{d}} that he is the owner of the product, he proves that his secret key xux_{u} is included in the pseudonym PseudonymPseudonym by executing a zero-knowledge proof with SkdS_{k_{d}}. If the proof is correct, UU is the owner of the product; otherwise, he is not the owner of the product.

Verify.

When UU receives a product, he checks whether the product was delivered correctly by checking the validity of the aggregate signature σ\sigma. If it is, the product is delivered correctly; otherwise, there are some problems in the delivery process.

Trace.

Given (σ,Pseudonym,AgY,m)(\sigma,Pseudonym,AgY,m), in the case that a user needs to be de-anonymized, the trace party TT first checks whether the signature is correct or not. If it is incorrect, TT aborts; otherwise, TT users his secret key xtx_{t} to de-anonymize the Pseudonym and get UU’s public key YuY_{u}.

3.2 Formal Construction

The formal construction of our PPLIST scheme is formalised by the following eight algorithms:

Setup.

The system runs (1l)(e,q,G1,G2,Gι,g1,g2)\mathscr{B}(1^{l})\rightarrow(e,q,G_{1},G_{2},G_{\iota},g_{1},g_{2}) with e:G1×G2Gιe:G_{1}\times G_{2}\rightarrow G_{\iota}. Let g1g_{1} be a generator of G1G_{1} and g2g_{2} be a generator of G2G_{2}. Suppose that H1:{0,1}G1,H2:{0,1}ZqH_{1}:\big{\{}0,1\big{\}}^{*}\rightarrow G_{1},H_{2}:\big{\{}0,1\big{\}}^{*}\rightarrow Z_{q} and H3:{0,1}ZqH_{3}:\big{\{}0,1\big{\}}^{*}\rightarrow Z_{q} are cryptographic hash functions. The public parameters are PUB=(e,q,G1,G2,Gι,g1,g2,H1,H2,H3)PUB=(e,q,G_{1},G_{2},G_{\iota},g_{1},g_{2},H_{1},H_{2},H_{3}).

Key-Generation.
  • 1)

    StationKeyGeneration.Station-Key-Generation. Each logistics station SiS_{i} selects xsiRZqx_{s_{i}}\stackrel{{\scriptstyle R}}{{\leftarrow}}Z_{q} and computes Ysi=g2xsiY_{s_{i}}=g_{2}^{x_{s_{i}}}. The secret-public key pair of SiS_{i} is (xsi,Ysi)(x_{s_{i}},Y_{s_{i}}), where i=1,2,3,,ni=1,2,3,\cdots,n.

  • 2)

    UserKeyGeneration.User-Key-Generation. Each UU selects xuRZqx_{u}\stackrel{{\scriptstyle R}}{{\leftarrow}}Z_{q} and computes Yu=g2xuY_{u}=g_{2}^{x_{u}}. The secret-public key pair of UU is (xu,Yu)(x_{u},Y_{u}).

  • 3)

    TraceKeyGeneration.Trace-Key-Generation. TT selects xtRZqx_{t}\stackrel{{\scriptstyle R}}{{\leftarrow}}Z_{q} and computes Yt=g2xtY_{t}=g_{2}^{x_{t}}. The secret-public key pair of TT is (xt,Yt)(x_{t},Y_{t}).

User-Pseudonym.

To generate a pseudonym for a product information mm, UU firstly computes k=H3(xum)k=H_{3}(x_{u}\parallel m) and then computes C1=g2k,C2=Ytkg2xuC_{1}=g_{2}^{k},C_{2}=Y_{t}^{k}\cdot g_{2}^{x_{u}}. The pseudonym is Pseudonym=(C1,C2)Pseudonym=(C_{1},C_{2}).

Public-Key-Aggregation.

Let AgY={YSk1,YSk2,,YSkd}AgY=\big{\{}Y_{S_{k_{1}}},Y_{S_{k_{2}}},\cdots,Y_{S_{k_{d}}}\big{\}} be a set consisting of the public keys of the logistics stations which will deliver the product to the user. The system firstly computes hi=H2(YSkiAgY)h_{i}=H_{2}(Y_{S_{k_{i}}}\parallel AgY), and then computes YA=i=1dYSkihiYA=\prod_{i=1}^{d}{Y_{S_{k_{i}}}}^{h_{i}}. Let (Pseudonym,m,AgY,YA)(Pseudonym,m,AgY,YA) be a record of the product information mm. The system adds it into the table TableTable.

Sign.

When receiving a product, each SkiS_{k_{i}} computes Sigi=H1(C1C2m)hixSkiSig_{i}=H_{1}(C_{1}\parallel C_{2}\parallel m)^{h_{i}\cdot x_{S_{k_{i}}}}. SkiS_{k_{i}} sends SigiSig_{i} to Ski+1S_{k_{i+1}} for i=1,2,3,,d2i=1,2,3,\cdots,d-2. Finally, SkdS_{k_{d}} computes SigdSig_{d} and σ=i=1dSigi\sigma=\prod_{i=1}^{d}Sig_{i}. Subsequently, SkdS_{k_{d}} adds it into the record of mm in the table TableTable.

User-Ownership-Verify.

To prove the ownership of the product to the last logistics station SkdS_{k_{d}}. UU and SkdS_{k_{d}} work as follows.

  • 1)

    UU selects v1RZq,v2RZqv_{1}\stackrel{{\scriptstyle R}}{{\leftarrow}}Z_{q},v_{2}\stackrel{{\scriptstyle R}}{{\leftarrow}}Z_{q} and computes V1=g2v1,V2=Ytv1g2v2V_{1}=g_{2}^{v_{1}},V_{2}=Y_{t}^{v_{1}}\cdot g_{2}^{v{2}}.

  • 2)

    UU sends C1,C2,V1,V2C_{1},C_{2},V_{1},V_{2} to SkdS_{k_{d}}. SkdS_{k_{d}} selects cRZqc\stackrel{{\scriptstyle R}}{{\leftarrow}}Z_{q}, and returns it to UU.

  • 3)

    UU computes r1=v1ckr_{1}=v_{1}-c\cdot k, and r2=v2cxur_{2}=v_{2}-c\cdot x_{u}, and returns (r1,r2)(r_{1},r_{2}) to SkdS_{k_{d}}.

  • 4)

    SkdS_{k_{d}} verifies V1=?g2r1C1cV_{1}\stackrel{{\scriptstyle?}}{{=}}g_{2}^{r_{1}}\cdot C_{1}^{c}, and V2=?Ytr1g2r2C2cV_{2}\stackrel{{\scriptstyle?}}{{=}}Y_{t}^{r_{1}}\cdot g_{2}^{r_{2}}\cdot C_{2}^{c}. If these equations hold, it outputs 11 to show that UU is the owner of the product; otherwise, it outputs 0 to show that UU is not the owner of the product.

Verify.

UU verifies e(σ,g21)e(H1(C1C2m),YA)=?1Gιe(\sigma,g_{2}^{-1})\cdot e(H_{1}(C_{1}\parallel C_{2}\parallel m),YA)\stackrel{{\scriptstyle?}}{{=}}1_{G_{\iota}}. If the equation holds, it outputs 11 to show that the delivery process is correct; otherwise, it outputs 0 to show that there are some errors in the delivery.

Trace.

In the case that the identity of UU who selected the product mm needs to be revealed, TT searches in the table TableTable, and finds the record (σ,Pseudonym,YA,(\sigma,Pseudonym,YA, m)m) firstly. Then, TT verifies e(σ,g21)e(H1(C1C2m),YA)=?1Gιe(\sigma,g_{2}^{-1})\cdot e(H_{1}(C_{1}\parallel C_{2}\parallel m),YA)\stackrel{{\scriptstyle?}}{{=}}1_{G_{\iota}}. If it is not, TT quits the system immediately; otherwise, TT computes Yu=C2/C1xtY_{u}=C_{2}/C_{1}^{x_{t}}, and confirms the identity of user.

4 Security Analysis

In this section, the security of our scheme is formally proven.

Theorem 4.1

Our privacy-preserving logistics information system with traceability (PPLIST) is (ϱ,ϵ(l))(\varrho,\epsilon(l))- unforgeable if and only if the (ϵ(l),T)(\epsilon(l)^{{}^{\prime}},T)- computational Diffie-Hellman (CDH) assumption holds on the bilinear group (e,q,G1,G2,Gι)(e,q,G_{1},G_{2},G_{\iota}) and H1,H2H_{1},H_{2} are two random oracles and H3H_{3} is a cryptographic hash function, where ϱ\varrho is the number of signature queries made by the forger \mathcal{F}, and ϵ(l)1q1q11ϱϵ(l)\epsilon(l)^{{}^{\prime}}\geq\frac{1}{q}\cdot\frac{1}{q-1}\cdot\frac{1}{\varrho}\cdot\epsilon(l).

Proof

Suppose that there exists a forger \mathcal{F} that can break the unforgeability of our scheme, we can construct an algorithm \mathcal{B} which can use \mathcal{F} to break the CDH assumption. Given (A,B1,B2)=(g1α,g1β,g2β)(A,B_{1},B_{2})=(g_{1}^{\alpha},g_{1}^{\beta},g_{2}^{\beta}), the aim of \mathcal{B} is to output g1αβg_{1}^{\alpha\beta}.

Setup.

\mathcal{B} selects H3:{0,1}pH_{3}:\{0,1\}^{*}\rightarrow\mathbb{Z}_{p}. The public parameters are PUB=(e,q,G1,G2,Gι,g1,g2,H3)PUB=(e,q,G_{1},\\ G_{2},G_{\iota},g_{1},g_{2},H_{3}).

\bullet

\mathcal{B} responds to the queries of \mathcal{F} about the random oracle H1H_{1}.

  • 1)

    \mathcal{F} queries the hash function H1H_{1} of a pseudonym (C1k,C2k)(C_{1}^{k},C_{2}^{k}) and a message mkm_{k}. \mathcal{B} selects tkRZqt_{k}\stackrel{{\scriptstyle R}}{{\leftarrow}}Z_{q},and sets H1(C1kC2kmK)=g1tkH_{1}(C_{1}^{k}\parallel C_{2}^{k}\parallel m^{K})=g_{1}^{t_{k}},where k=1,2,nk=1,2,\cdots n. \mathcal{B} sends g1tig_{1}^{t_{i}} to \mathcal{F} and adds (C1k,C2k,mk,gtk)(C_{1}^{k},C_{2}^{k},m_{k},g^{t_{k}}) into the table Table1Table_{1}.

  • 2)

    \mathcal{F} queries the hash function H1H_{1} of a pseudonym (C1,C2)(C_{1}^{*},C_{2}^{*}) and a message mm^{*}. \mathcal{B} sends g1αg_{1}^{\alpha} to \mathcal{F}, and adds (C1,C2,m,g1α)(C_{1}^{*},C_{2}^{*},m^{*},g_{1}^{\alpha}) into the table Table1Table_{1}.

\bullet

\mathcal{B} responds to the queries of \mathcal{F} about the random oracle H2H_{2}. Let jj is the index of YsjAgYY_{s_{j}}\in AgY.

  • 1)

    when iji\not=j, \mathcal{B} selects hiRqh_{i}\stackrel{{\scriptstyle R}}{{\leftarrow}}\mathbb{Z}_{q} and sets hi=H2(YsiAgY)h_{i}=H_{2}(Y_{s_{i}}\parallel AgY). \mathcal{B} returns hih_{i} to \mathcal{F} and adds (Ysi,AgY,hi)(Y_{s_{i}},AgY,h_{i}) into the table Table2Table_{2}.

  • 2)

    when i=ji=j, \mathcal{B} selects hjRZqh_{j}\stackrel{{\scriptstyle R}}{{\leftarrow}}Z_{q} and sets hj=H2(YsjAgY)h_{j}=H_{2}(Y_{s_{j}}\parallel AgY). \mathcal{B} returns hjh_{j} to \mathcal{F}, and adds (Ysj,AgY,hj)(Y_{s_{j}},AgY,h_{j}) into the table Table2Table_{2}.

Key-Generation Query.
  • 1)

    StationKeyGenerationQuery.Station-Key-Generation\ Query. \mathcal{B} picks a station SjS_{j} from S1,S2,,SnS_{1},S_{2},\cdots,S_{n}. For the ii-th logistics station key generation query, \mathcal{B} selects xsix_{s_{i}}, and computes YSi=g2xsiY_{S_{i}}=g_{2}^{x_{s_{i}}} where iji\not=j. \mathcal{B} returns YSiY_{S_{i}} to \mathcal{F}. For the jj-th logistics station key generation query, \mathcal{B} returns B2B_{2} to \mathcal{F}.

  • 2)

    UserKeyGenerationQuery.User-Key-Generation\ Query. \mathcal{B} selects xuRZqx_{u}\stackrel{{\scriptstyle R}}{{\leftarrow}}Z_{q}, and compute Yu=g2xuY_{u}=g_{2}^{x_{u}}. \mathcal{B} sends the secret-public key pair (xu,Yu)(x_{u},Y_{u}) to \mathcal{F}.

  • 3)

    TraceKeyGenerationQuery.Trace-Key-Generation\ Query. \mathcal{B} selects xtRZqx_{t}\stackrel{{\scriptstyle R}}{{\leftarrow}}Z_{q}, and compute Yt=g2xtY_{t}=g_{2}^{x_{t}}. \mathcal{B} sends the secret-public key pair (xt,Yt)(x_{t},Y_{t}) to \mathcal{F}.

User-Pseudonym Query.

\mathcal{F} submits a product information mm. \mathcal{B} computes k=H3(xum)k=H_{3}(x_{u}\parallel m) firstly, then computes C1=g2kC_{1}=g_{2}^{k}, C2=Ytkg2xuC_{2}=Y_{t}^{k}\cdot g_{2}^{x_{u}}. 𝒞\mathcal{C} sends (C1,C2)(C_{1},C_{2}) to \mathcal{F}.

Public-Key-Aggreation Query.

\mathcal{F} submits a group of logistics stations’ public-key and sets AgY={Ys1,Ys2,,Ysd}AgY=\big{\{}Y_{s_{1}},Y_{s_{2}},\cdots,Y_{s_{d}}\big{\}}. \mathcal{B} searches in Table2Table_{2}, and gets hi=H2(YsiAgY)h_{i}=H_{2}(Y_{s_{i}}\parallel AgY), where i=1,2,3di=1,2,3\cdots d. \mathcal{B} computes YA=i=1dYsihiYA=\prod_{i=1}^{d}Y_{s_{i}}^{h_{i}}, and sends YAYA to \mathcal{F}.

Sign Query.

\mathcal{B} responds to the queries of \mathcal{F} about the single signature SigiSig_{i}:

  • 1)

    Since iji\not=j, \mathcal{F} asks about the single signature of the logistics station SiS_{i} on a pseudonym (C1,C2)(C1,C2)(C_{1},C_{2})\not=(C_{1}^{*},C_{2}^{*}) and the message mm^{*}. \mathcal{B} computes Sigi=g1αhixsiSig_{i}=g_{1}^{\alpha\cdot h_{i}\cdot x_{s_{i}}}. \mathcal{B} sends SigiSig_{i} to \mathcal{F}.

  • 2)

    Since iji\not=j, \mathcal{F} asks about the single signature of station SjS_{j} on a pseudonym (C1,C2)(C_{1},C_{2}) and a message mmm\not=m^{*}. \mathcal{B} computes Sigi=g1tihiβSig_{i}=g_{1}^{t_{{i}}\cdot h_{i}\cdot\beta}. \mathcal{B} sends SigiSig_{i} to \mathcal{F}. \mathcal{F} can ask for many times.

  • 3)

    \mathcal{F} asks about the single signature of station SjS_{j} on a pseudonym (C1,C2)(C_{1}^{*},C_{2}^{*}) and the message mm^{*}. \mathcal{B} aborts.

Output.

\mathcal{F} outputs a forged final signature σ\sigma^{{}^{\prime}}. According to the above situations, \mathcal{F} can make qq queries of random oracles and ϱ\varrho signature generations, respectively. By using Forking lemma technique, for two queries of the random oracle H2H_{2} on the jj-th station, \mathcal{B} selects hjh_{j} and hjh_{j}^{{}^{\prime}} with hjhjh_{j}\not=h_{j}^{{}^{\prime}}. For other selected stations, \mathcal{B} sets hih_{i} and hih_{i}^{{}^{\prime}} with hi=hih_{i}=h_{i}^{{}^{\prime}}. Hence, YA/YA=i=1dYSkjhjhjYA/YA^{{}^{\prime}}=\prod_{i=1}^{d}{Y_{S_{k_{j}}}}^{h_{j}-h_{j}^{{}^{\prime}}}. If \mathcal{F} can forge a valid signature, \mathcal{B} have Sigj=g1αβhiSig_{j}=g_{1}^{\alpha\cdot\beta\cdot h_{i}} and Sigj=g1αβhiSig_{j}^{{}^{\prime}}=g_{1}^{\alpha\cdot\beta\cdot h_{i}^{{}^{\prime}}}, respectively. Then, \mathcal{B} computes σ/σ=g1αβ(hihi)\sigma/\sigma^{{}^{\prime}}=g_{1}^{\alpha\cdot\beta\cdot(h_{i}-h_{i}^{{}^{\prime}})}. Therefore, \mathcal{B} can compute g1αβ=(σ/σ)1/(hihi)g_{1}^{\alpha\cdot\beta}=(\sigma/\sigma^{{}^{\prime}})^{1/(h_{i}-h_{i}^{{}^{\prime}})} and break the CDH assumption.

Since \mathcal{F} needs to make two hash queries to get different values of hih_{i} and hih_{i}^{{}^{\prime}}, the advantage is (1q1q1)(\frac{1}{q}\cdot\frac{1}{q-1}). Furthermore, \mathcal{F} queries the single signature of station SjS_{j} on the pseudonym (C1,C2)(C_{1}^{*},C_{2}^{*}) and the message mm^{*} with the advantage 1ϱ\frac{1}{\varrho}. Therefore, the advantage with which \mathcal{B} can break the CDH assumption is

AdvCDH1q1q11ϱϵ(l)Adv_{\mathcal{B}}^{CDH}\geq\frac{1}{q}\cdot\frac{1}{q-1}\cdot\frac{1}{\varrho}\cdot\epsilon(l) (3)
Theorem 4.2

Our privacy-preserving logistics information systems with traceability (PPLIST) is (ϱ,ϵ(l))(\varrho,\epsilon(l))- traceable if the computational Diffie-Hellman (CDH
) assumption holds on the bilinear group (e,q,G1,G2,Gι)(e,q,G_{1},G_{2},G_{\iota}) with the advantage at most ϵ1(l)\epsilon_{1}(l), the discrete logarithm (DL) assumption holds on the group G2G_{2} with the advantage at most ϵ2(l)\epsilon_{2}(l), and H1,H2,H3H_{1},H_{2},H_{3} are random oracles, where ϱ\varrho is the number of signature queries made by the forger \mathcal{F}, and ϵ(l)=max{(121q1ϱϵ1(l)),(12ϵ2(l))}\epsilon(l)=max\big{\{}(\frac{1}{2}\cdot\frac{1}{q}\cdot\frac{1}{\varrho}\cdot\epsilon_{1}(l)),(\frac{1}{2}\cdot\epsilon_{2}(l))\big{\}}.

Proof

Suppose that there exists an adversary 𝒜\mathcal{A} that can break the traceability of our scheme, we can construct an algorithm \mathcal{B} which can use 𝒜\mathcal{A} to break the CDH assumption or DL assumption.

Setup.

The public parameters are PUB=(e,q,G1,G2,Gι,g1,g2)PUB=(e,q,G_{1},G_{2},G_{\iota},g_{1},g_{2}).

\bullet

\mathcal{B} responds to the queries of 𝒜\mathcal{A} about the random oracle H1H_{1}.

  • 1)

    𝒜\mathcal{A} queries H1H_{1} on a pseudonym (C1k,C2k)(C_{1}^{k},C_{2}^{k}) and a message mkm_{k}. \mathcal{B} selects tkRZqt_{k}\stackrel{{\scriptstyle R}}{{\leftarrow}}Z_{q}, and sets g1tk=H1(C1kC2kmk)g_{1}^{t_{k}}=H_{1}(C_{1}^{k}\parallel C_{2}^{k}\parallel m_{k}), where i=1,2,ni=1,2,\cdots n. \mathcal{B} sends g1tkg_{1}^{t_{k}} to 𝒜\mathcal{A}, and adds (C1k,C2k,mk,g1tk)(C_{1}^{k},C_{2}^{k},m_{k},g_{1}^{t_{k}}) to the table Table1Table_{1}.

  • 2)

    𝒜\mathcal{A} queries H1H_{1} of a pseudonym (C1,C2)(C_{1}^{*},C_{2}^{*}) and a message mm^{*}. \mathcal{B} sets g1α=H1(C1C2m)g_{1}^{\alpha}=H_{1}(C_{1}^{*}\parallel C_{2}^{*}\parallel m_{*}). \mathcal{B} sends g1αg_{1}^{\alpha} to 𝒜\mathcal{A}, and adds (C1,C2,m,g1α)(C_{1}^{*},C_{2}^{*},m^{*},g_{1}^{\alpha}) to the table Table1Table_{1}.

\bullet

\mathcal{B} responds to the queries of 𝒜\mathcal{A} about the random oracle H2H_{2}. Let jj be the index of YsjAgYY_{s_{j}}\in AgY.

  • 1)

    when iji\not=j, \mathcal{B} selects hiRqh_{i}\stackrel{{\scriptstyle R}}{{\leftarrow}}\mathbb{Z}_{q} and sets hi=H2(YSiAgY)h_{i}=H_{2}(Y_{S_{i}}\parallel AgY). \mathcal{B} returns hih_{i} to 𝒜\mathcal{A}, and records it into the table Table2Table_{2}.

  • 2)

    when i=ji=j, \mathcal{B} selects hjRZqh_{j}\stackrel{{\scriptstyle R}}{{\leftarrow}}Z_{q} and sets hj=H2(YSjAgY)h_{j}=H_{2}(Y_{S_{j}}\parallel AgY). \mathcal{B} sends hjh_{j} to 𝒜\mathcal{A} and adds (YSj,AgY,hj)(Y_{S_{j}},AgY,h_{j}) into the table Table2Table_{2}.

\bullet

\mathcal{B} responds to the queries of 𝒜\mathcal{A} about the random oracle H3H_{3}. When receiving a query (xu,m)(x_{u},m) on H3H_{3}, 𝒜\mathcal{A} selects kRpk\stackrel{{\scriptstyle R}}{{\leftarrow}}\mathbb{Z}_{p} and returns it to 𝒜\mathcal{A}. \mathcal{B} adds (xu,m,k)(x_{u},m,k) into the table Table3Table_{3}.

Key-Generation Query.
  • 1)

    StationKeyGenerationQuery.Station-Key-Generation\ Query. \mathcal{B} picks a logistics station SjS_{j} from S1,S2,,SnS_{1},S_{2},\cdots,S_{n}. For the ii-th logistics station key generation query, \mathcal{B} selects xsix_{s_{i}}, and computes YSi=g2xsiY_{S_{i}}=g_{2}^{x_{s_{i}}} where iji\not=j. \mathcal{B} returns YSiY_{S_{i}} to 𝒜\mathcal{A}. For the jj-th logistics station key generation query, \mathcal{B} returns B2B_{2} to 𝒜\mathcal{A}.

  • 2)

    UserKeyGenerationQuery.User-Key-Generation\ Query. \mathcal{B} selects xuRZqx_{u}\stackrel{{\scriptstyle R}}{{\leftarrow}}Z_{q}, and compute Yu=g2xuY_{u}=g_{2}^{x_{u}}. \mathcal{B} retains the private key xux_{u}, sends the public key YuY_{u} to 𝒜\mathcal{A}, and sets GPUGPU to store the public key YuY_{u} of all users. YuY_{u^{*}} is the public key of user UU^{*}.

  • 3)

    TraceKeyGenerationQuery.Trace-Key-Generation\ Query. \mathcal{B} selects xtRZqx_{t}\stackrel{{\scriptstyle R}}{{\leftarrow}}Z_{q}, and compute Yt=g2xtY_{t}=g_{2}^{x_{t}}. \mathcal{B} sends the secret-public key pair (xt,Yt)(x_{t},Y_{t}) to 𝒜\mathcal{A}.

User-Pseudonym Query.

𝒜\mathcal{A} submits a user’s secret key xux_{u} and a product information mm. \mathcal{B} first searches in the table Table3Table_{3} and gets k=H3(xum)k=H_{3}(x_{u}\parallel m). Then \mathcal{B} computes C1=g2kC_{1}=g_{2}^{k}, C2=Ytkg2xuC_{2}=Y_{t}^{k}\cdot g_{2}^{x_{u}}. 𝒞\mathcal{C} sends (C1,C2)(C_{1},C_{2}) to 𝒜\mathcal{A}.

Public-Key-Aggreation Query.

𝒜\mathcal{A} submits a group of logistics stations’ public-keys and sets AgY={Ys1,Ys2,,Ysd}AgY=\big{\{}Y_{s_{1}},Y_{s_{2}},\cdots,Y_{s_{d}}\big{\}} . \mathcal{B} searches on the table Table2Table_{2}, and gets hi=H2(YsiAgY)h_{i}=H_{2}(Y_{s_{i}}\parallel AgY) where i=1,2,3,,di=1,2,3,\cdots,d. \mathcal{B} computes YA=i=1dYsihiYA=\prod_{i=1}^{d}Y_{s_{i}}^{h_{i}}. \mathcal{B} sends YAYA to 𝒜\mathcal{A}.

Sign Query.

\mathcal{B} responds to the queries of 𝒜\mathcal{A} about the single signature SigiSig_{i}:

  • 1)

    when iji\not=j, 𝒜\mathcal{A} asks about the single signature of station SiS_{i} on a pseudonym (C1,C2)(C1,C2)(C_{1},C_{2})\not=(C_{1}^{*},C_{2}^{*}) and the message mm^{*}. \mathcal{B} computes Sigi=g1αhixsiSig_{i}=g_{1}^{\alpha\cdot h_{i}\cdot x_{s_{i}}}. \mathcal{B} sends SigiSig_{i} to 𝒜\mathcal{A}.

  • 2)

    when iji\not=j, 𝒜\mathcal{A} asks about the single signature of station SjS_{j} on a pseudonym (C1,C2)(C_{1},C_{2}) and a message mmm\not=m^{*}. \mathcal{B} computes Sigi=g1tihiβSig_{i}=g_{1}^{t_{{i}}\cdot h_{i}\cdot\beta}. \mathcal{B} sends SigiSig_{i} to 𝒜\mathcal{A}.

  • 3)

    𝒜\mathcal{A} asks about the single signature of station SjS_{j} on a pseudonym (C1,C2)(C_{1}^{*},C_{2}^{*}) and the message mm^{*}. \mathcal{B} aborts.

Output.

𝒜\mathcal{A} outputs a final signature σ\sigma^{{}^{\prime}}. We consider the following two types of attackers. Suppose that the secret-public key pair of UU^{{}^{\prime}} is (xu,Yu)(x_{u}^{{}^{\prime}},Y_{u}^{{}^{\prime}}), and 𝒜\mathcal{A} only knows YuY_{u}^{{}^{\prime}}. In Type-1 case, 𝒜\mathcal{A} outputs a final signature σ\sigma^{{}^{\prime}} containing a new pseudonym (C1,C2)(C^{{}^{\prime}}_{1},C^{{}^{\prime}}_{2}). In Type-2 case, 𝒜\mathcal{A} also outputs a final signature σ\sigma^{{}^{\prime}} which is a signature on a used pseudonym.

Type-1: If there is a new pseudonym (C1,C2)UPQ(C^{{}^{\prime}}_{1},C^{{}^{\prime}}_{2})\notin UPQ. 𝒞\mathcal{C} uses (C1,C2)(C^{{}^{\prime}}_{1},C^{{}^{\prime}}_{2}) to compute Yu=C2/(C1)xtY^{{}^{\prime}}_{u}=C^{{}^{\prime}}_{2}/(C^{{}^{\prime}}_{1})^{x_{t}}, and gets YuY^{{}^{\prime}}_{u}, YuGPUY^{{}^{\prime}}_{u}\notin GPU. 𝒜\mathcal{A} forged a single signature SigiSig_{i}^{{}^{\prime}} and a final signature σ\sigma^{{}^{\prime}}, where Sigi=H1(C1C2m)hixsiSig_{i}^{{}^{\prime}}=H_{1}(C^{{}^{\prime}}_{1}\parallel C^{{}^{\prime}}_{2}\parallel m)^{h_{i}\cdot x_{s_{i}}}, and σ=i=1dSigi\sigma^{{}^{\prime}}=\prod_{i=1}^{d}Sig_{i}^{{}^{\prime}}. Hence, \mathcal{B} can use 𝒜\mathcal{A} to break CDH assumption, The detailed proof is shown in Theorem 1.

Type-2: If there is a pseudonym (C1,C2)(C^{{}^{\prime}}_{1},C^{{}^{\prime}}_{2}), namely (C1,C2)UPQ(C^{{}^{\prime}}_{1},C^{{}^{\prime}}_{2})\in UPQ. \mathcal{B} uses (C1,C2)(C^{{}^{\prime}}_{1},C^{{}^{\prime}}_{2}) to compute Yu=C2/(C1)xtY^{{}^{\prime}}_{u}=C^{{}^{\prime}}_{2}/(C^{{}^{\prime}}_{1})^{x_{t}}, and gets YuY^{{}^{\prime}}_{u} with YuYuGPUY^{{}^{\prime}}_{u}\not=Y_{u^{*}}\in GPU. If 𝒜\mathcal{A} can prove C1=g2k,C2=Ytkg2xuC^{\prime}_{1}=g_{2}^{k^{\prime}},C_{2}=Y_{t}^{k^{\prime}}\cdot g_{2}^{x^{\prime}_{u}}. By using the rewinding technique, \mathcal{B} can extract the knowledge of (xu,k)(x^{{}^{\prime}}_{u},k^{\prime}) from 𝒜\mathcal{A}. Therefore, given (Yu,g2)(Y^{{}^{\prime}}_{u},g_{2}), \mathcal{B} can output a xux_{u}^{{}^{\prime}} such that Yu=g2xuY^{{}^{\prime}}_{u}=g_{2}^{x_{u}^{{}^{\prime}}}. Hence, \mathcal{B} can use 𝒜\mathcal{A} to break the DL assumption.

By the proof of unforgeability, the advantage with which \mathcal{B} can break the CDH assumption is (1q1q11ϱϵ1(l))(\frac{1}{q}\cdot\frac{1}{q-1}\cdot\frac{1}{\varrho}\cdot\epsilon_{1}(l)). In the situation of Type-1, \mathcal{B} can break the CDH assumption with the advantage (121q1q11ϱϵ1(l))(\frac{1}{2}\cdot\frac{1}{q}\cdot\frac{1}{q-1}\cdot\frac{1}{\varrho}\cdot\epsilon_{1}(l)). In the situation of Type-2, \mathcal{B} can break the DL assumption with the advantage 12ϵ2(l)\frac{1}{2}\cdot\epsilon_{2}(l). Hence, ϵ(l)=max{(121q1q11ϱϵ1(l)),(12ϵ2(l))}\epsilon(l)=max\big{\{}(\frac{1}{2}\cdot\frac{1}{q}\cdot\frac{1}{q-1}\cdot\frac{1}{\varrho}\cdot\epsilon_{1}(l)),(\frac{1}{2}\cdot\epsilon_{2}(l))\big{\}}.

5 Experiment and Evaluation

In this section, we introduce the implementation and evaluation of our PPLIST scheme.

5.1 Runtime Environment

The performance of our PPLIST scheme is measured on a Lenovo Legion Y7000P 2018 laptop with an Intel Core i7-8750H CPU, 500GB SSD and 8GB RAM. The scheme is implemented in Microsoft Windows 10 System using E-clipse Integrated environment, Java language and JPBC library [3].

In our implementation, we apply the Type F curve. For the hash functions H1:{0,1}G1H_{1}:\big{\{}0,1\big{\}}^{*}\rightarrow G_{1}, H2:{0,1}ZqH_{2}:\big{\{}0,1\big{\}}^{*}\rightarrow Z_{q} and H3:{0,1}ZqH_{3}:\big{\{}0,1\big{\}}^{*}\rightarrow Z_{q} required by our scheme, we used SHA256SHA-256 and the “newElementfromHash()” method in the JPBC library.

Our scheme is implemented in the following three cases: 1) n=20,d=10n=20,d=10; 2) n=100,d=50n=100,d=50; 3) n=200,d=100n=200,d=100. The experimental results are shown in Table 3.

Table 3: Times(ms)
Phase n=20,d=10 n=100,d=50 n=200,d=100
Setup 522 519 506
Station-Key-Generation 137 578 1031
User-Key-Generation 7 5 4
Trace-Key-Generation 8 5 3
User-Pseudonym 27 12 12
Public-Key-Aggregation 217 745 1400
Sign 122 486 953
User-Ownership-Verify 112 106 97
Verify 176 144 141
Trace 186 144 141

5.2 Timing

The setup phase is a process run by the system. It takes 522ms, 519ms and 506ms to setup the system in case 1, case 2 and case 3, respectively. According to the data, it can be observed that the running time of the three cases is roughly the same in the setup phase.

The key pair generation phase is run by logistics stations, user and trace party. It takes 137ms, 578ms and 1031ms to generate the key pair of logistics stations in case 1, case 2 and case 3, respectively. In the user key pair generation phase, it takes 7ms, 5ms and 4ms in case 1, case 2 and case 3, respectively. For trace party to generate key pair, it takes 8ms, 5ms and 3ms in case 1, case 2 and case 3, respectively.

The pseudonym generation phase is run by the user. It takes 27 ms, 12ms and 12 ms in case 1, case 2 and case 3, respectively. Observing the experimental data, it is not difficult to find that the running time of the public key aggregation phase is proportional in the number of logistics stations. It takes 259ms, 745ms and 1400ms to aggregate public keys in the three cases, respectively. The signature phase is run by logistics stations. The times to generate a multi-signature in case 1, case 2 and case 3 are 122ms, 486ms and 953ms, respectively.

In the user ownership verification phase, a user proves the ownership by interacting with the last logistics station. It takes 112ms, 106ms and 97ms in case 1, case 2 and case 3, respectively. In signature validation phase, it takes 186ms, 144ms and 141ms to verify a multi-signature in case 1, case 2 and case 3, respectively. To trace a user, it takes 176ms, 144ms and 141ms in case 1, case 2 and case 3, respectively. We implement our scheme in three different cases. The experiment results show the efficiency of our scheme.

6 Conclusions

In this paper, to protect users’ privacy in LIS, a PPLIST was proposed. In our scheme, users anonymously use logistics services. Furthermore, a trace party can de-anonymized users to prevent illegal logistics. Additionally, the whole logistics process can be recorded and is unforgeable. We formalize the definition and security model of our scheme, and present a formal construction. We formally proved the security of our scheme and implemented it.

In our scheme, a buyer can prove the ownership of a product by proving the knowledge included in the pseudonyms. Our future work is to improve the flexibility of this work to enable an owner to designate a proxy to prove the ownership of products on behalf of him.

Acknowledgment

This work was partially supported by the National Natural Science Foundation of China (Grant No. 61972190, 62072104, 61972095) and the National key research and development program of China (Grant No. 2020YFE0200600). This work was also partially supported by the Postgraduate Research & Practice Innovation Program of Jiangsu Province (Grand No. KYCX20_1322) and the Natural Science Foundation of the Fujian Province, China (Grant No. 2020J01159).

References

  • [1] Amazon. https://www.amazon.cn
  • [2] Taobao. https://www.taobao.com
  • [3] Angelo, D.C., Vincenzo, I.: JPBC:Java pairing based cryptography. In: ISCC 2011. pp. 850–855. IEEE (2011)
  • [4] Asaar, M.R., Salmasizadeh, M., Susil, W.: An identity-based multi-proxy multi-signature scheme without bilinear pairings and its variants. The Computer Journal 58(4), 1021–1039 (2015)
  • [5] Bagherzandi, A., e, J.H.C., Jareck, S.: Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma. In: CCS 2008. pp. 449–458. ACM (2008)
  • [6] Bardi, E.J., Raghunathan, T.S., Bagchi, P.K.: Logistics information systems: The strategic role of top management. Journal of Business Logistics 15(1), 71–85 (1994)
  • [7] Bellare, M., Neven, G.: Multi-signatures in the plain public-key model and a general forking lemma. In: CCS 2006. pp. 390–399. ACM (2006)
  • [8] Boldyreva, A.: Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme. In: PKC 2003. LNCS, vol. 2567, pp. 31–46. Springer (2003)
  • [9] Boneh, D., Drijvers, M., Neven, G.: Compact multi-signatures for smaller blockchains. In: ASIACRYPT 2018. LNCS, vol. 11273, pp. 435–464. Springer (2018)
  • [10] Chaum, D.: Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM 28(10), 1030–1044 (1985)
  • [11] Chaum, D., hendrik Evertse, J.: A secure and privacy-protecting protocol for transmitting personal information between organizations. In: CRYPTO 1986. LNCS, vol. 263, pp. 118–167. Springer (1986)
  • [12] Chen, L.: Access with pseudonyms. In: CPA 1995. LNCS, vol. 1029, pp. 232–243. Springer (1995)
  • [13] Chrisos, M.: Pseudonymization Techniques: How to Protect Your Data. https://www.techfunnel.com/information-technology/pseudonymization-techniques-how-to-protect-your-data/ (2019)
  • [14] Christin, N., Yanagihara, S.S., Kamataki, K.: Dissecting one click frauds. In: CCS 2010. pp. 15–26. ACM (2010)
  • [15] Closs, D.J., Xu, K.: Logistics information technology practice in manufacturing and merchandising firms – An international benchmarking study versus world class logistics firms. International Journal of Physical Distribution & Logistics Management 30(10), 869–886 (2000)
  • [16] Correll, N., Bekris, K.E., Berenson, D., Brock, O., Causo, A., Hauser, K., Okada, K., Rodriguez, A., Romano, J.M., Wurman, P.R.: Analysis and observations from the first Amazon picking challenge. IEEE Transactions on Automation Science and Engineering 15(1), 172–188 (2018)
  • [17] Gao, Q., Zhang, J., Ma, J., Yang, C., Guo, J., Miao, Y.: LIP-PA: A logistics information privacy protection scheme with position and attribute-based access control on mobile devices. Wireless Communications and Mobile Computing 2018(1), 1–14 (2018)
  • [18] Gordon, D.M.: Discrete logarithms in GF(P) using the number field sieve. SIAM Journal on Discrete Mathematics 6(1), 124–138 (1993)
  • [19] Grinshpoun, T., Grubshtein, A., Zivan, R., Netzer, A., Meisels, A.: Asymmetric distributed constraint optimization problems. Journal of Artificial Intelligence Research 47(1), 613–647 (2013)
  • [20] Han, J., Chen, L., Schneider, S., Treharne, H., Wesemeyer, S., Wilson, N.: Anonymous single sign-on with proxy re-verification. IEEE Transactions on Information Forensics and Security 15(1), 223–236 (2020)
  • [21] Hanaoka, G., Kurosawa, K.: Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption. In: ASIACRYPT 2008. LNCS, vol. 5350, pp. 308–325. Springer (2008)
  • [22] Horster, P., Michels, M., Petersen, H.: Meta-Multisignature schemes based on the discrete logarithm problem, pp. 128–142. IFIP, Springer (1995)
  • [23] Itakura, K., Nakamura, K.: A public-key cryptosystem suitable for digital multisignatures. NEC Research & Development 71(1),  1–8 (1983)
  • [24] Kang, J., Yu, R., Huang, X., Zhang, Y.: Privacy-preserved pseudonym scheme for fog computing supported internet of vehicles. IEEE Transactions on Intelligent Transportation Systems 19(8), 2627–2637 (2018)
  • [25] Kim, D.J., Song, Y.I., Braynov, S.B., Rao, H.R.: A multidimensional trust formation model in B-to-C e-commerce: A conceptual framework and content analyses of academia/practitioner perspectives. Decision Support Systems 40(2), 143–165 (2005)
  • [26] Korth, B., Schwede, C., Zajac, M.: Simulation-ready digital twin for realtime management of logistics systems. In: IEEE Big Data 2018. pp. 4194–4201. IEEE (2018)
  • [27] Lai, K., Ngai, E., Cheng, T.: Information technology adoption in Hong Kong’s logistics industry. Transportation Journal 44(4),  1–9 (2005)
  • [28] Liu, F., Shu, P., Lui, J.C.S.: AppATP:An energy conserving adaptive mobile-cloud transmission protocol. IEEE Transactions on Computers 64(11), 3051–3063 (2015)
  • [29] Liu, S., Wang, J.: A security-enhanced express delivery system based on NFC. In: ICSICT 2016. pp. 1534–1536. IEEE (2016)
  • [30] Lysyanskaya, A., Micali, S., Reyzin, L., Shacham, H.: Sequential aggregate signatures from trapdoor permutations. In: EUROCRYPT 2004. LNCS, vol. 3027, pp. 74–90. Springer (2004)
  • [31] Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In: SAC 1999. LNCS, vol. 1758, pp. 184–199. Springer (1999)
  • [32] Léauté, T., Faltings, B.: Coordinating logistics operations with privacy guarantees. In: IJCAI 2011. pp. 2482–2487. Morgan Kaufmann (2011)
  • [33] Marko, A., Marjan, M., Vlada, S.: Logistics information system. Vojnotehnicki glasnik 58(1), 33–61 (2010)
  • [34] Micali, S., Ohta, K., Reyzin, L.: Accountable-subgroup multisignatures: Extended abstract. In: CCS 2001. pp. 245–254. ACM (2001)
  • [35] Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: S & P 2009. pp. 173–187. IEEE (2009)
  • [36] Neven, G.: Efficient sequential aggregate signed data. IEEE Transactions on Information Theory 57(3), 1803–1815 (2011)
  • [37] Ngai, E., Lai, K.H., Cheng, T.: Logistics information systems: The Hong Kong experience. International Journal of Production Economics 113(1), 223–234 (2008)
  • [38] Ohta, K., Okamoto, T.: A digital multisignature scheme based on the fiat-shamir scheme. In: ASIACRYPT 1991. LNCS, vol. 739, pp. 139–148. Springer (1991)
  • [39] Ohta, K., Okamoto, T.: Multisignature schemes secure against active insider attacks. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E82-A(1), 21–31 (1999)
  • [40] Okamoto, T.: A digital multisignature scheme using bijective public-key cryptosystems. ACM Transactions on Computer Systems 6(4), 432–441 (1988)
  • [41] Qi, H., Chenjie, D., Yingbiao, Y., Lei, L.: A new express management system based on encrypted QR code. In: ICICTA 2015. pp. 53–56. IEEE (2015)
  • [42] Qian, J., Li, X., Zhang, C., Chen, L.: De-anonymizing social networks and inferring private attributes using knowledge graphs. In: INFOCOM 2016. pp. 1–9. IEEE (2016)
  • [43] Qu, Z., He, P., Hou, L.: Studies on internet real-name system and network action surveillance system. In: EDT 2010. pp. 469–472. IEEE (2010)
  • [44] Stallings, W.: Handling of personal information and deidentified, aggregated, and pseudonymized information under the California consumer privacy act. IEEE Security & Privacy 18(1), 61–64 (2020)
  • [45] Tarjan, L., Senk, I., Tegeltija, S., Stankovski, S., Ostojic, G.: A readability analysis for QR code application in a traceability system. Computers & Electronics in Agriculture 109(4), 1–11 (2014)
  • [46] Tiwari, N., Padhye, S., He, D.: Efficient ID-based multiproxy multisignature without bilinear maps in ROM. Annals of Telecommunications 68(3-4), 231–237 (2013)
  • [47] Wei, Q., Li, X.: Express information protection application based on k-anonymity. Application Research of Computers 31(2), 555–567 (2014)
  • [48] Wei, Q., Wang, C., Li, X.: Express information privacy protection application based on RSA. Application of Electronic Technique 40(7), 58–60 (2014)
  • [49] Xu, F.J., Tan, C.J., Tong, F.C.: Auto-ID enabled tracking and tracing data sharing over dynamic B2B and B2G relationships. In: RFID-TA 2011. pp. 394–401. IEEE (2011)
  • [50] Ye, L., Wang, Y., Chen, J.: Research on the intelligent warehouse management system based on near field communication (NFC) technology. International Journal of Advanced Pervasive and Ubiquitous Computing 8(2), 38–55 (2016)
  • [51] Yong, L., Jing, P., Ma, B., Bo, Y.: The analysis of logistic bottleneck of taobao.com in C2C model and its countermeasures. In: ICEE 2010. pp. 5537–5539. IEEE (2010)