[1] Qiu Fudong, Wu Fan, Chen Guihai. Privacy and quality preserving multimedia data aggregation for participatory sensing systems[J]. IEEE Transactions on Mobile Computing, 2014, 14(6):1287-1300. [2] Rahaman S, Cheng L, Yao D D, et al. Provably secure anonymous-yet-accountable crowdsensing with scalable sublinear revocation[J]. Privacy Enhancing Technologies, 2017(4):384-403. [3] Sucasas V, Mantas G, Bastos J, et al. A signature scheme with un-linkable-yet-accountable pseudonymity for privacy-preserving crowdsensing[J]. IEEE Transactions on Mobile Computing, 2019, 19(4):752-768. [4] Ni Jianbing, Zhang Kuan, Xia Qi, et al. Enabling strong privacy preservation and accurate task allocation for mobile crowdsensing[J]. IEEE Transactions on Mobile Computing, 2019, 19(6):1317-1331. [5] Zhao Bowen, Tang Shaohua, Liu Ximeng, et al. PACE:privacy-preserving and quality-aware incentive mechanism for mobile crowdsensing[J]. IEEE Transactions on Mobile Computing, 2020, 20(5):1924-1939. [6] Sun Peng, Wang Zhibo, Feng Yunhe, et al. Towards personalized privacy-preserving incentive for truth disco-very in crowdsourced binary-choice question answering[C]//IEEE Conference on Computer Communications. Toronto:IEEE, 2020:1133-1142. [7] Galbraith S D, Paterson K G, Smart N P. Pairings for cryptographers[J].Discrete Applied Mathematics, 2008, 156(16):3113-3121. [8] Chase M, Lysyanskaya A. On signatures of knowledge[C]//Annual International Cryptology Conference. Berlin:Springer, 2006:78-96. [9] Camenisch J. Group signature schemes and payment systems based on the discrete logarithm problem[D]. Zurich:Swiss Federal Institute of Technology, 1998. [10] Pointcheval D, Sanders O. Short randomizable signatures[C]//Cryptographers' Track at the RSA Conference. San Francisco:Springer, 2016:111-126. [11] Camenisch J, Lysyanskaya A. Dynamic accumulators and application to efficient revocation of anonymous credentials[C]//Annual International Cryptology Conference. Berlin:Springer, 2002:61-76. [12] Baldimtsi F, Camenisch J, Dubovitskaya M, et al. Accumulators with applications to anonymity-preserving revocation[C]//IEEE European Symposium on Security and Privacy. Paris:IEEE, 2017:301-315. [13] Camenisch J, Drijvers M, Lehmann A, et al. Short threshold dynamic group signatures[C]//International Conference on Security and Cryptography for Networks. Amalfi:Springer, 2020:401-423. [14] MIRACL Company Limited. Multiprecision integer and rational arithmetic cryptographic library version 7.0[EB/OL]. (2019-08-21)[2020-10-20]. https://github.com/miracl/MIRACL. [15] Dang Q H. Secure Hash standard:NIST FIPS 180-4-2015[S]. Gaithersburg:National Institute of Standards and Technology, 2015:21-23. [16] Fan J, Vercauteren F, Verbauwhede I. Faster Fp-arithmetic for cryptographic pairings on Barreto-Naehrig curves[C]//International Workshop on Cryptographic Hardware and Embedded Systems. Berlin:Springer, 2009:240-253. |