Zero-knowledge proof-based method and system for protecting user identity privacy

A zero-knowledge proof, user identity technology, applied in the field of user identity privacy protection based on zero-knowledge proof, can solve problems such as the inability to protect user identity privacy and identity privacy exposure.

Active Publication Date: 2015-11-04
NO 709 RES INST OF CHINA SHIPBUILDING IND CORP
View PDF5 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But in fact, only through anonymity and generalization can not protect the user's identity privacy very well
This is due to the cumulative and associated nature of user record data,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Zero-knowledge proof-based method and system for protecting user identity privacy
  • Zero-knowledge proof-based method and system for protecting user identity privacy
  • Zero-knowledge proof-based method and system for protecting user identity privacy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Such as figure 1 As described above, the embodiment of the present invention provides a zero-knowledge proof-based user identity privacy protection method flow, including the following steps:

[0031] S1. Identity key request: the data user 10 sends an identity key generation request message to the identity management center 30 through the established secure channel, and the request message includes the identity information of the data user 10 .

[0032] S2. Identity key generation: The identity management center 30 generates an identity key uniquely representing its identity for the data user 10 according to the identity information of the data user 10, and stores the identity information of the data user 10 into the locally maintained data In the user information table, the identity key of the data user 10 is sent to the data user 10 through a secure channel.

[0033] S3. Public parameter setting: setting public parameters of the data user 10 and the big data publish...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A zero-knowledge proof-based method for protecting user identity privacy comprises the steps as follows: S1, identity secret key requesting: a data user transmits identity secret key generation request information to an identity management centre via an established secure channel; S2, identity secret key generation: the identity management centre uses the identity information of the data user; S3, public parameter setting: public parameters of the data user and a big-data releasing platform are set; S4, zero-knowledge proof protocol execution: an interactive zero-knowledge proof protocol is executed between the data user and the big-data releasing platform; S5, shared secret key requesting: the data user transmits shared secret key generation request information to the identity management centre via the secure channel; S6, shared secret key generation: the identity management centre generates a shared secret key for the data user and the big-data releasing platform; S7, account number and password generation: the big-data releasing platform generates a temporary account number and a corresponding password for the data user and establishes the secure channel.

Description

technical field [0001] The invention relates to the technical field of computer information security, in particular to a zero-knowledge proof-based user identity privacy protection method and system. Background technique [0002] Big data contains a large amount of original information. Through the analysis and use of big data, users can obtain knowledge laws and development trends about things more effectively and accurately. However, while big data brings convenience and benefits to users, it also brings harm to the leakage of user identity and privacy. [0003] A large number of facts show that when users use big data, their identity information and behavior status will be recorded, and their identity privacy is facing a great threat. Moreover, in the big data environment, the threat faced by users is not limited to the leakage of personal privacy, but also lies in the prediction of user status and behavior based on big data. Many researches and implementations often be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 任正伟徐明迪沈楚楚明瑞扬
Owner NO 709 RES INST OF CHINA SHIPBUILDING IND CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products