Contact person tracking privacy protection method based on aggregation signature

A privacy protection and private key technology, applied in short-distance communication services, user identity/authority verification, security devices, etc., can solve the problems of slow authentication speed, large communication overhead and memory overhead

Active Publication Date: 2021-09-14
XI'AN POLYTECHNIC UNIVERSITY
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this scheme, each contact needs to be authenticated separately. When the number of people contacted by the confirmed person is too large, the authentication speed will be too slow, and the communication overhead and memory overhead will be too large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Contact person tracking privacy protection method based on aggregation signature
  • Contact person tracking privacy protection method based on aggregation signature
  • Contact person tracking privacy protection method based on aggregation signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0072] A method for privacy protection of contact tracing based on aggregated signatures, specifically implemented according to the following steps:

[0073] Step 1, user registration, specifically:

[0074] Step 1.1, the manager runs the key generation algorithm Gen to generate the manager’s public-private key pair (pk,sk)←Gen(λ), λ∈N is the security parameter, and announces the system parameters {λ,q,u,u at the same time 1 ,p,p 1 ,p 2 ,pk,H}, the parameters are initialized in the user's application program;

[0075] Step 1.2, the user registers with the manager and chooses his own private key i=sk I ∈ Z q , automatically calculate the public key The public key and personal information are uploaded to the manager, and the manager generates an anonymous personal id for each registered user I ∈ Z q and manager authentication cert I ←Sign(sk,pk I , time, id I ), the user will id I and cert I Save it locally on your phone. To protect user privacy, this must be done ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a contact person tracking privacy protection method based on an aggregation signature. The method specifically comprises the steps: firstly, generating public and private key pairs of a manager, a user and a doctor; the user broadcasts the hash value of the personal data packet, and when the users meet, whether the opposite side is a legal user is authenticated; after the authentication succeeds, mutual commitments are generated among the users; the user aggregates the signatures of the data packets of other users stored in the commitment process into a single short signature; then, the diagnosers create respective false identities for the contact persons of the diagnosers; the diagnoser sends the false identity information to the doctor, and after the doctor verifies the identity of the contact person, a group signature is generated, and the data packet is uploaded to the block chain; the doctor reports a definite diagnosis state of the user to a manager; and finally determining a close contact person. By adopting the aggregation signature technology, the local storage space of the user is saved, the privacy of the contact person can be protected by the aggregation zero-knowledge proof generated by the diagnoser to the contact person. Meanwhile, the identity authentication speed of the doctor to the contact person can be increased.

Description

technical field [0001] The invention belongs to the technical field of information privacy protection, and in particular relates to a contact tracking privacy protection method based on aggregated signatures. Background technique [0002] The automated contact tracing technology proposed by many researchers uses applications in smartphones, as well as GPS positioning, Bluetooth communication and other functions to achieve short-distance communication between devices. This tracking is faster and more efficient than traditional methods. However, while pursuing efficiency, this scheme ignores the issue of user privacy, especially the privacy protection of contacts. [0003] In 2020, Joseph K. Liud and others proposed to use zero-knowledge proof technology to solve the privacy problem in the process of contact tracing. Under the premise of discrete logarithm difficulty assumption, a temporary pseudo-identity is constructed for the contact, and the generation can only prove it...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/80H04W12/02H04W12/041H04W12/06H04L9/32H04L29/08
CPCH04W4/80H04W12/02H04W12/041H04W12/06H04L9/3247H04L9/3218H04L67/1097H04L67/12H04L2209/42H04L9/50Y02D30/70
Inventor 刘沫萌邵明强张泽宇柴文强
Owner XI'AN POLYTECHNIC UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products