Routing method with metadata privacy protection and source responsibility investigation capabilities

A privacy protection and source accountability technology, applied in data exchange networks, electrical components, digital transmission systems, etc., can solve problems such as inability to explain EphID, reduce anonymity sets, and lack of accountability capabilities

Active Publication Date: 2020-11-03
NAT UNIV OF DEFENSE TECH
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But APNA also has some problems: sharing keys within the source domain reduces the anonymity set
In addition, entities outside the source domain cannot interpret EphID and have no accountability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Routing method with metadata privacy protection and source responsibility investigation capabilities
  • Routing method with metadata privacy protection and source responsibility investigation capabilities
  • Routing method with metadata privacy protection and source responsibility investigation capabilities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0108] The present invention will be further described below in conjunction with accompanying drawing of description and specific preferred embodiment, figure 1 It is a general flowchart of the present invention, and the steps of the present invention include:

[0109] The first step: system initialization. figure 2 The network topology of the present invention is shown. Before opening a session, the group administrator first generates key keys in the group: group management private key, group public key and group user private key, and distributes the group user private key to legitimate users in the group. At the same time, the nodes on each path are initialized.

[0110] The second step: link establishment. The flow chart of message forwarding in the link establishment phase is as follows: Figure 4 shown. Link establishment packet structure reference image 3 .

[0111] 2.1) The source S first constructs the forward link building message SP → . Source S first cons...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of computer network security, and relates to an efficient routing protocol for simultaneously providing anonymity and responsibility investigation capability in a network layer, in particular to a routing method with metadata privacy protection and source responsibility investigation capabilities. According to the method of the invention, a group signature is attached to a message network layer to realize the balance between anonymity and responsibility. The group signature in the message can provide wide and efficient responsibility investigation,and the authenticity of the message can be verified by any router on a path in a non-interaction mode, so that the communication overhead during message verification is eliminated. Meanwhile, the privacy of the sender is protected by the group signature, so that the signer in the group cannot be distinguished by entities outside the group. In addition, in order to further reduce the verification overhead of the group signature, a challenge-based separation verification mechanism is designed. Compared with pre-calculation and batch verification, the separate verification mechanism can reduce the verification load of the specified router to a greater extent, thereby improving the efficiency of the protocol.

Description

technical field [0001] The invention belongs to the technical field of computer network security, relates to an efficient routing protocol that provides both anonymity and accountability at the network layer, and specifically relates to a routing method with metadata privacy protection and source accountability capabilities. Background technique [0002] A large number of network monitoring incidents have made the public's demand for communication privacy protection increasingly strong. Although traditional end-to-end encryption can protect data privacy, it cannot protect host identity privacy. Attackers can still know "who communicates with whom where and when" through network attacks. Therefore, anonymous communication emerges as the times require. Anonymous communication mainly protects metadata in the communication process while protecting data privacy, thereby protecting user identity privacy. Since the birth of the first anonymous network (Chaum's Mix-Nets), researche...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L12/715
CPCH04L9/3255H04L9/0833H04L45/04H04L2209/42
Inventor 夏雨生陈荣茂苏金树陈曙晖王小峰
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products