User identity privacy protection method and system based on zero-knowledge proof

A zero-knowledge proof, user identity technology, applied in the field of user identity privacy protection based on zero-knowledge proof, can solve the problems of identity privacy exposure and user identity privacy cannot be well protected.

Active Publication Date: 2018-03-23
NO 709 RES INST OF CHINA SHIPBUILDING IND CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But in fact, only through anonymity and generalization can not protect the user's identity privacy very well
This is due to the cumulative and associated nature of user record data, a single record may not expose the user's identity privacy, but if multiple user behavior records can be associated together, the user's identity privacy may be compromised. exposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity privacy protection method and system based on zero-knowledge proof
  • User identity privacy protection method and system based on zero-knowledge proof
  • User identity privacy protection method and system based on zero-knowledge proof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Such as figure 1 As described above, the embodiment of the present invention provides a zero-knowledge proof-based user identity privacy protection method flow, including the following steps:

[0031] S1. Identity key request: the data user 10 sends an identity key generation request message to the identity management center 30 through the established secure channel, and the request message includes the identity information of the data user 10 .

[0032] S2. Identity key generation: The identity management center 30 generates an identity key uniquely representing its identity for the data user 10 according to the identity information of the data user 10, and stores the identity information of the data user 10 into the locally maintained data In the user information table, the identity key of the data user 10 is sent to the data user 10 through a secure channel.

[0033] S3. Public parameter setting: setting public parameters of the data user 10 and the big data publish...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A user identity privacy protection method based on zero-knowledge proof, including: S1. Identity key request: the data user sends identity key generation request information to the identity management center through an established secure channel; S2. Identity key generation: The identity management center uses the identity information of the data user; S3. Public parameter setting: setting the public parameters of the data user and the big data publishing platform; S4. Zero-knowledge proof protocol: executed between the data user and the big data publishing platform Interactive zero-knowledge proof protocol; S5. Shared key request: The data user initiates a shared key generation request message to the identity management center through a secure channel; S6. Shared key generation: The identity management center publishes a shared key for the data user and big data The platform generates a shared key; S7. Account and password generation: the big data release platform generates temporary accounts and corresponding passwords for data users, and establishes a secure channel.

Description

technical field [0001] The invention relates to the technical field of computer information security, in particular to a zero-knowledge proof-based user identity privacy protection method and system. Background technique [0002] Big data contains a large amount of original information. Through the analysis and use of big data, users can obtain knowledge laws and development trends about things more effectively and accurately. However, while big data brings convenience and benefits to users, it also brings harm to the leakage of user identity and privacy. [0003] A large number of facts show that when users use big data, their identity information and behavior status will be recorded, and their identity privacy is facing a great threat. Moreover, in the big data environment, the threat faced by users is not limited to the leakage of personal privacy, but also lies in the prediction of user status and behavior based on big data. Many researches and implementations often be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 任正伟徐明迪沈楚楚明瑞扬
Owner NO 709 RES INST OF CHINA SHIPBUILDING IND CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products