A routing method with metadata privacy protection and source accountability capabilities

A privacy protection and source accountability technology, applied to electrical components, digital transmission systems, and key distribution, can solve problems such as inability to explain EphID, reduce anonymity sets, and lack of accountability capabilities, so as to improve verification efficiency and prevent address spoofing Attacks, broad accountability effects

Active Publication Date: 2022-05-17
NAT UNIV OF DEFENSE TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But APNA also has some problems: sharing keys within the source domain reduces the anonymity set
In addition, entities outside the source domain cannot interpret EphID and have no accountability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A routing method with metadata privacy protection and source accountability capabilities
  • A routing method with metadata privacy protection and source accountability capabilities
  • A routing method with metadata privacy protection and source accountability capabilities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0108] The present invention will be further described below in conjunction with accompanying drawing of description and specific preferred embodiment, figure 1 It is a general flowchart of the present invention, and the steps of the present invention include:

[0109] The first step: system initialization. figure 2 The network topology of the present invention is shown. Before opening the session, the group administrator first generates key keys in the group: group management private key, group public key and group user private key, and distributes the group user private key to legitimate users in the group. At the same time, the nodes on each path are initialized.

[0110] The second step: link establishment. The flow chart of message forwarding in the link establishment phase is as follows: Figure 4 shown. Link establishment packet structure reference image 3 .

[0111] 2.1) The source S first constructs the forward link building message SP → . Source S first co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of computer network security, relates to an efficient routing protocol that provides both anonymity and accountability at the network layer, and specifically relates to a routing method with metadata privacy protection and source accountability capabilities. The technical solution of the invention is to attach the group signature to the message network layer to achieve the balance of anonymity and accountability. The group signature in the message can provide extensive and efficient accountability. It can be verified by any router on the path in a non-interactive way to verify the authenticity of the message, thereby eliminating the communication overhead when verifying the message. At the same time, the group signature protects the privacy of the sender, making the signer indistinguishable from entities outside the group within the group. In addition, in order to further reduce the verification overhead of the group signature, the present invention designs a challenge-based separation verification mechanism. Compared with precomputation and batch verification, the separate verification mechanism can reduce the verification load of the designated router to a greater extent, thereby improving the efficiency of the protocol.

Description

technical field [0001] The invention belongs to the technical field of computer network security, relates to an efficient routing protocol that provides both anonymity and accountability at the network layer, and specifically relates to a routing method with metadata privacy protection and source accountability capabilities. Background technique [0002] A large number of network monitoring incidents have made the public's demand for communication privacy protection increasingly strong. Although traditional end-to-end encryption can protect data privacy, it cannot protect host identity privacy. Attackers can still know "who communicates with whom where and when" through network attacks. Therefore, anonymous communication emerges as the times require. Anonymous communication mainly protects metadata in the communication process while protecting data privacy, thereby protecting user identity privacy. Since the birth of the first anonymous network (Chaum's Mix-Nets), researche...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04L45/00
CPCH04L9/3255H04L9/0833H04L45/04H04L2209/42
Inventor 夏雨生陈荣茂苏金树陈曙晖王小峰
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products