Privacy protection attribute authentication system and method based on verifiable declaration

A privacy protection and authentication system technology, applied in digital data authentication, digital data protection, instruments, etc., can solve the problems of lack of protection of attribute privacy and the inability to control the use of identity attribute information, so as to prevent leakage and ensure privacy security Effect

Pending Publication Date: 2021-08-06
NORTHEASTERN UNIV
View PDF10 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, eID also supports citizens' self-identification, which makes citizens' identities undergo different conversions in different applications. Therefore, the use of eID can effectively protect the privacy of citizens' identities, but there is still a lack of protection of attribute privacy, and users still cannot Control the usage of your own identity attribute information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection attribute authentication system and method based on verifiable declaration
  • Privacy protection attribute authentication system and method based on verifiable declaration
  • Privacy protection attribute authentication system and method based on verifiable declaration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0110] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0111] In this embodiment, an attribute authentication protocol based on verifiable statements is used for privacy protection between users. The present invention designs and implements attribute authentication satisfying privacy protection based on BB signature and Pedersen commitment mechanism.

[0112] On the one hand, a privacy protection attribute authentication system based on verifiable statements, including: users, identity providers, and service providers;

[0113] The user is the party that initiates the message request;

[0114] The service provider decides whether to provide services to the user according to the response information of the identity provider; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a privacy protection attribute authentication system and method based on a verifiable declaration, and relates to the technical field of privacy protection in identity authentication. The method comprises the following steps: firstly, designing a data structure of a voucher by adopting a verifiable declaration of W3C, and verifying a signature of the data structure to confirm whether the declarated content is valid or not, thereby standardizing an identity verification standard; for the privacy problem existing in the verifiable declaration, expanding the structure of the verifiable declaration, and adding corresponding fields, so that the verifiable declaration has anonymity. Interval certification, non-relation certification and or relation certification of attribute values are realized by adopting a BB short signature scheme and a non-interactive zero-knowledge certification technology; detailed designs of protocols are given, including initialization, a certificate issuing protocol, a certificate showing protocol and an attribute proving protocol, and a verifiable declaration is applied to the protocols; and privacy protection authentication of the user is realized.

Description

technical field [0001] The present invention relates to the technical field of privacy protection in identity authentication, in particular to a verifiable statement-based privacy protection attribute authentication system and method. Background technique [0002] In recent years, the development of the Internet and computer technology has brought great changes to our lives. We can use different network identities to participate in online movie watching, online shopping, online education, e-medicine, e-government and other activities. While these activities greatly facilitate our lives, they also bring many problems that cannot be ignored. Usually, the online service provider will verify the identity of the user, require the user to provide some private and sensitive attribute information, and store this sensitive information on the server. This can easily lead to the leakage of users' private information. On the one hand, this may be due to service providers selling user i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/33G06F21/46G06F21/60G06F21/62G06F21/64
CPCG06F21/33G06F21/46G06F21/64G06F21/604G06F21/6245
Inventor 郭楠孟奇赵雨康
Owner NORTHEASTERN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products