CN102594820A - Secure multi-party computation privacy-protecting evaluation method based on scenes of internet of things - Google Patents

Secure multi-party computation privacy-protecting evaluation method based on scenes of internet of things Download PDF

Info

Publication number
CN102594820A
CN102594820A CN2012100363398A CN201210036339A CN102594820A CN 102594820 A CN102594820 A CN 102594820A CN 2012100363398 A CN2012100363398 A CN 2012100363398A CN 201210036339 A CN201210036339 A CN 201210036339A CN 102594820 A CN102594820 A CN 102594820A
Authority
CN
China
Prior art keywords
test
appraisal
person
database
evaluating result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012100363398A
Other languages
Chinese (zh)
Other versions
CN102594820B (en
Inventor
孙力娟
周旋
黄海平
王汝传
徐佳
吕亚超
严骐
尚上
戴庭
窦轶
沙超
肖甫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shang Yang Polytron Technologies Inc
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN201210036339.8A priority Critical patent/CN102594820B/en
Publication of CN102594820A publication Critical patent/CN102594820A/en
Application granted granted Critical
Publication of CN102594820B publication Critical patent/CN102594820B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The diversification of information acquisition terminals in an internet of things causes easy leakage of private information of a user, and the privacy of an evaluator and an evaluated person face serious threat, therefore, the protection of the privacy of evaluation parties becomes an urgent problem in online evaluation of the internet of things. In order to solve the problem, the invention provides a secure multi-party computation privacy-protecting evaluation method based on scenes of internet of things. The method has the beneficial effects that since the authentication of the identity of the evaluated person is carried out by using an identity authentication protocol and simultaneously the encryption and decryption processes of evaluation questionnaires are properly controlled, the security of evaluation is further ensured; since a high-efficiency secure multi-party computation is applied in the design of a secure evaluation system, the secure scoring and ranking of a trusted third party is not needed, the intervention of an evaluation mechanism is reduced, and the privacy of evaluation is guaranteed; and by use of the method for separated storage of evaluation data in an evaluation result data and an evaluated person database, on the basis of secure multi-party summing and scoring, the personal privacy of the evaluator and the evaluated person is protected.

Description

Safety based on the Internet of Things scene is calculated the secret protection assessment method in many ways
Technical field
Protection test and appraisal person and the implementation method that is inviolable by test and appraisal person both sides privacy information when the present invention relates to the test and appraisal of network in the Internet of Things belong to the crossing domain of Internet of Things and information security technology.
Background technology
Internet of Things is on the basis of computer internet; Through information sensing equipment such as radio frequency identification (RFID), infrared inductor, global positioning system, laser scanners; Agreement by agreement; Get up any article and Internet connection, carry out information exchange and communication, to realize a kind of network of intelligent identification, location, tracking, monitoring and management.The appearance of Internet of Things brings concrete and deep variation to modern society, and its application relates to the various aspects of people's daily life.Therefore in future, RFID RFID tag and wireless sensing devices and other information acquisition terminal will be distributed widely in our daily life and work.
Along with the extensive appearance of Internet of Things application scenarios, the RFID chip is embedded the online test and appraisal that multi-form input terminal is realized Internet of Things, this intelligentized test and appraisal mode will become people's participate in testing and assessing main path of questionnaire.To the test and appraisal problem of Internet of Things, on the one hand, each test and appraisal person hopes that the test and appraisal questionnaire of oneself is kept absolutely secret, and does not hope that anyone spies upon the test and appraisal questionnaire of oneself by any way; Simultaneously, do not hoped also that by test and appraisal person other people see the test and appraisal details of oneself, their privacy of oneself that all needs protection is in order to avoid cause adverse influence to oneself.On the other hand, because the variation of input terminal, the online test and appraisal of Internet of Things are under attack more easily than common papery test and appraisal and existing online test and appraisal, also handled more easily.Therefore want to protect test and appraisal both sides' privacy information, confirm test and appraisal person identity, to avoid aspects such as test and appraisal person repeatedly tests and assesses, secret is carried out fractional computation be very important, simultaneously also should simple and effective, just have practical value.The present invention proposes a kind of solution to the online test and appraisal secret protection problem based on Internet of Things.
The secret protection problem of the online test and appraisal of Internet of Things mainly is present in the following aspects from application point:
The first, because the extensive use of Internet of Things sensing equipment and RFID radio frequency identification equipment makes people carry out the mode variation more of data acquisition and data processing.In online test and appraisal, relate to a lot of test and appraisal persons and by the calculating of test and appraisal person's sensitive data and processing based on the Internet of Things scene.For example: because test and appraisal person uses different data entry terminal (such as equipment such as computer, mobile phone, PDA) to test and assess; Input terminal all is equipped with the RFID label of storage test and appraisal person identity information; This carries out strict authentication with regard to needing the test and appraisal center to test and appraisal person's identity, avoids malicious attacker stealing and destroying these sensitive datas.When test and appraisal, also need stop test and appraisal person as far as possible and repeatedly participate in test and appraisal simultaneously, guarantee the fairness of test and appraisal.This be Internet of Things test and assess on the net the problem that must pay attention to.
The present invention is directed to first problem, promptly the diversity at image data terminal has added identification agreement pre-authentication process, and test and appraisal person issues certificate of certification through the authentication center, and authentication is carried out in contrast registration information data storehouse.Use this agreement can check out illegal test and appraisal person easily, guarantee carrying out smoothly of test and appraisal process.During the authentication of this identification agreement person of test and appraisal identity, malicious attacker can not be disturbed normally carrying out of test and appraisal so it can't construct invalid test and appraisal questionnaire through identification protocol proof identity.Simultaneously, add the suffix character string at the back in the test and appraisal data of encrypting and judge whether test and appraisal person repeats test and appraisal, stop same test and appraisal person repeatedly to participate in test and appraisal.
Second; Because each input terminal all will be participated in intelligence computation in the Internet of Things; The online evaluation system of Internet of Things by gather test and appraisal person's identity information stage, authentication test and appraisal person identity stage, test and appraisal person test and assess the stage, collect the test and appraisal questionnaire, the evaluating result calculation stages is formed, each stage should be by corresponding its function of security protocol realization.The online test and appraisal of Internet of Things are exactly that the problem that the test and appraisal questionnaire proposes is answered, and then carry out the process of computing.Each test and appraisal person and measured person all have the right to the end test and appraisal ranking; But can't learn the test and appraisal questionnaire that other people are concrete again; Protect the private information of oneself to be inviolable, will become the problem that online test and appraisal secret protection is worth research so the gross score of test and appraisal questionnaire calculates.
Consider second above problem, the present invention proposes a kind of do not have safety under the third-party situation of safety calculate in many ways find the solution the method for test and assess to the end mark and rank.The safety of no trusted third party is calculated the fractional computation of protocol application in online test and appraisal questionnaire in many ways, in case test and appraisal finish, any test and appraisal person can score, and can obtain evaluating result.Compare score scheme in the past, this scheme has strict fairness, and single test and appraisal person does not cooperate with other test and appraisal person, all can't score in advance.All test and appraisal person's fellowship safety is sued for peace in many ways and is added up mark, if the result who exists the test and appraisal person of or minority to announce is different with the result that most test and appraisal persons obtain, can explain that then these test and appraisal persons are dishonest.With calculating the design of protocol application efficiently safely in many ways in the security evaluation system, realize the secret security score rank of testing and assessing and not needing trusted third party, reduce the intervention of the mechanism that tests and assesses, guaranteed the privacy of test and appraisal.
The 3rd, people need the privacy of due care oneself in the test and appraisal on the net, but can both correctly receive the end product of test and appraisal again.For example: in the teaching test and appraisal, on the one hand, the student had both wanted to see the overall test and appraisal rank of all classmates to teacher on the net when the teacher who teaches oneself is tested and assessed, and did not want to let other classmates see own concrete evaluation to teacher again; On the other hand, teacher hopes to see that the student to concrete evaluation of oneself and the final ranking of oneself, can not see other teachers' test and appraisal questionnaire and student's identity information again.In the epoch of the various application high speed developments of Internet of Things, the due care of privacy information is become problem demanding prompt solution.
To the 3rd above problem; The present invention uses the evaluating result data and is separated the method for depositing the test and appraisal data by test and appraisal person's database; On the safety of second problem was sued for peace the basis of scoring in many ways, each test and appraisal person's evaluating result database can both get mark and rank to the end, and filters out test and appraisal person's identity information; This result is sent to by in test and appraisal person's database, can both be checked end product and about oneself test and appraisal details by test and appraisal person.Simultaneously, each test and appraisal person can read each measured person's total points numerical value and last rank from own corresponding RFID label, but can't extract other test and appraisal persons' concrete test and appraisal questionnaire, thereby has protected test and appraisal person's individual privacy.
Summary of the invention
Technical problem: the object of the invention is primarily aimed at the secret protection problem of the online test and appraisal of Internet of Things; Propose a kind of safety and calculate the secret protection assessment method in many ways based on the Internet of Things scene; When obtaining correct evaluating result, due care test and appraisal person and do not revealed by test and appraisal person's privacy information.
Technical scheme:
At first provide several definition:
The online test and appraisal of Internet of Things: because the extensive use of Internet of Things sensing equipment and RFID radio frequency identification equipment makes people carry out the mode variation more of data acquisition and data processing.The online test and appraisal of Internet of Things as the intellectualizing system of testing and assessing on the common net, will become people's participate in testing and assessing main path of questionnaire.Because the user uses different data entry terminal (such as equipment such as computer, mobile phone, PDA) to test and assess; Input terminal all is equipped with the RFID label of storage subscriber identity information, and the identity information that RFID label on the input terminal can obtain the user only need be gathered in the test and appraisal center.
Test and appraisal person: participate in filling in the crowd of test and appraisal questionnaire, the importer of the data of promptly testing and assessing.For example: in teaching test and appraisal, the student who participates in test and appraisal is exactly test and appraisal person, and they get into evaluation systems the filling in of questionnaire of testing and assessing through various data terminals, the end product that finally can obtain testing and assessing through data terminal.
Measured person: the test and appraisal object that relates on the test and appraisal questionnaire is measured person.For example: the teacher who is tested and assessed in the teaching test and appraisal is exactly said here by test and appraisal person.The student tests and assesses to the teacher through filling in relevant test and appraisal questionnaire, and teacher can see oneself last test and appraisal rank and the concrete test and appraisal questionnaire of each part, but can't see student's identity information and other teachers' test and appraisal questionnaire.
The authentication agreement: the trusted party TA (Trusted Authority) of this agreement through an authentication is for the user issues certificate, and user Prover (P) can be described below effectively to the identity of Verifer (V) checking oneself:
At first produce environmental parameter.Choose two big prime number p and q, select a (a ≠ 1) again, and a satisfies a q=1 (modp), the security signature of TA and verification algorithm are counted Sign respectively TAAnd Ver TA
The certificate authority process is following:
1) user P selects a random number r, calculates v=a r(modp), oneself identity ID and v are provided to TA;
2) TA is to (ID, s=Sign v) signs TA(ID, v), TA to P issue certificate C (A)=(ID (A), v, s);
User P proves the process of identity to verifier V:
3) P transmission C (A)=(ID (A), v s) give V with v;
4) V is with the verification algorithm Ver of TA TAThe correctness of checking C (A);
5) V selects a number e, 1≤e≤2 at random t(t is a security parameter), and send to P;
6) P calculates y=(v+ae) (mod q), o=a -1(modp), and with y and o send to V;
7) V judges equality v=a yo rModp if set up, then verifies successfully; Otherwise authentication failed.
Safety is summation score agreement in many ways: hypothesis has n user to participate in anded here; Each user has the private data of oneself; They hope to calculate a result jointly, the information of the privately owned input of oneself but any one user is unwilling to reveal to other users.Safety summation score agreement in many ways is the participant of one group of mutual mistrust of research; They provide some secret inputs; Hope to calculate safely a summing function; Each participant wants to obtain correct result of calculation, and each participant's input is simultaneously maintained secrecy, and a participant can't learn another participant's input.
Method flow
In many ways calculate the method for secret protection that the secret protection assessment method uses authentication agreement and safety to calculate in many ways based on the safety of Internet of Things scene; When obtaining correct evaluating result; Protection test and appraisal person and do not revealed by test and appraisal person's privacy information, concrete flow process is following:
Step 1) is without loss of generality, and supposes to have a n test and appraisal person, and these test and appraisal persons use different test and appraisal terminals to test and assess in Internet of Things on the net, and they are with its identify label S iBe stored in the RFID tag RFID of having at its terminal, use the test and appraisal terminal when testing and assessing test and appraisal person, login system is the RFID label of automatic perception user terminal, and extracts its identify label S iCarry out authentication, i=1,2 ..., n;
Step 2) login system uses the certificate authority agreement in the authentication agreement to accomplish verification process, and system gives S iSelect random number r, calculate v=a r(modp), and v and its identification identifier S iIssue the authentication center together, authentication center is to S iProvide identity signing certificate C (A);
Step 3) S iV value and the identity signing certificate C (A) of end in registration information data storehouse forwarding step 2, the registration information data storehouse is through contrast test and appraisal person information database, and the proof procedure approval v and the C (A) of utilization authentication agreement agree S iFurther information typing;
Step 4) test and appraisal person S iIndividual to m by test and appraisal person T jTest and assess, j=1,2 ..., m uses w IjExpression test and appraisal person S iTo by test and appraisal person T jEvaluating result, simultaneously the registration information data storehouse provides each test and appraisal person S to the test and appraisal database hub iChecking data y iHash operation value H (y i) and the encryption key x of evaluating result IjHash operation value H (x Ij);
Step 5) need be to evaluating result w for the appearance with the phenomenon of stopping to repeat to test and assess of the confidentiality that strengthens the test and appraisal process IjCarry out cryptographic operation; Test and appraisal end S iSend E (w Ij, H (x Ij)) || H (y i) give the test and appraisal database hub, " E " is AES here, " || " is attended operation; Each test and appraisal person's H (y can be in time verified in the registration information data storehouse i) whether legal or repeat, prevent illegal person destruction and the person of participating in evaluation and electing repeat test and appraisal, if repetition arranged then be not counted in the test and appraisal database;
Step 6) test and appraisal database hub will be tested and assessed and held the content of sending to pass to the T by test and appraisal person jDatabase, filter out test and appraisal person's identity information, each is received the decrypted private key that send in the registration information data storehouse by test and appraisal person's database, deciphers all test and appraisal data through checking, obtains test and appraisal person S iTo by test and appraisal person T jEvaluating result w Ij, and send it to the fractional computation center;
Step 7) fractional computation center is to by test and appraisal person T jEvaluating result w IjCorresponding mark carries out summation operation, obtains test and appraisal person S iTo by test and appraisal person T jMark G Ij
Step 8) is with the G that obtains in the step 7 IjBe converted into k position binary sequence form, each test and appraisal person's evaluating result is expressed as G I1G I2... G ImWherein each is connected storage by test and appraisal person's mark, and these results are kept at the evaluating result database D iIn;
Step 9) is with binary sequence G I1G I2... G ImBe converted into decimal system numerical value P i, and these decimal system numerical value are splitted into n number P at random It, t=1,2 .., n makes Utilize safe lane with P ItSend to other n-1 evaluating result database D t, t ≠ i; D iAt the P that receives all the other n-1 evaluating result databases TiAfterwards, utilize fractional computation center calculation and formula
Figure BDA0000136414080000062
Step 10) D iWith the summed result P ' of oneself iBe broadcast to remaining n-1 evaluating result database; Each D iAfter receiving all the other n-1 evaluating result data of database, calculate it respectively at the fractional computation center, can calculate all test and appraisal achievement sum M:
M = Σ i = 1 n P i ′ = Σ i = 1 n Σ t = 1 n P ti = Σ t = 1 n Σ i = 1 n P ti = Σ t = 1 n P t = Σ i = 1 n P i
Step 11) obtains test and appraisal person S according to step 10 iTo all by test and appraisal person's test and appraisal achievement sum M i, S iCorresponding evaluating result database D iWith M iSend to remaining n-1 evaluating result database; Each D iAll obtain all test and appraisal persons' test and appraisal achievement sum M i
Each evaluating result database D of step 12) iAll M wherein iThe size of value is with M iBe worth identical S iDeposit in the middle of the same set, compare the element number of each set then, draw the maximum set of element number, S in this set iCorresponding M value is this D iIn final test and appraisal mark sum;
Step 13) D iM converts binary number to decimal number, and every then k carries out intercepting to M in the position, can obtain respectively all test and appraisal persons to each by test and appraisal person T jLast overall score.Obtain each by test and appraisal person T according to last overall score jLast test and appraisal rank, and this rank and last overall score be sent to all by in test and appraisal person's database.Compared M in test and appraisal person's database use step 12 iThe method that draws the M value is tried to achieve last mark and rank by test and appraisal person, and stores;
Step 14) test and appraisal person logins evaluation system by authentication; Read each measured person's total points numerical value and last rank from own corresponding RFID tag RFID; But can't extract other test and appraisal persons' concrete test and appraisal questionnaire, protect test and appraisal person's individual privacy;
Step 15) by test and appraisal person equally through the authentication login system; Check database by test and appraisal person; The test and appraisal final ranking that can see oneself and each test and appraisal person be to own overall merit, and identity information and other that can't see test and appraisal person are same by test and appraisal person's evaluating result; Other have further been protected by test and appraisal person's individual privacy by the evaluating result that test and appraisal person also can't see him.
Beneficial effect: the present invention proposes a kind of safety based on the Internet of Things scene and calculate the secret protection assessment method in many ways, this method has following advantage:
(1), make malicious attacker can't not construct invalid test and appraisal questionnaire and to disturb normally carrying out of test and appraisal through the identity of identification protocol authentication oneself through using the authentication of the identification agreement person of test and appraisal identity.Simultaneously, add the suffix character string at the back in the test and appraisal data of encrypting and judge whether test and appraisal person repeats test and appraisal, stop same test and appraisal person repeatedly to participate in test and appraisal, further guaranteed the fail safe of test and appraisal.
(2) the present invention does not calculate in many ways and finds the solution last mark and the rank that obtains testing and assessing through there being safety under safe third party's situation, has strict fairness.Single test and appraisal person does not cooperate with other test and appraisal person, can't score in advance.With calculating the design of protocol application efficiently safely in many ways in the security evaluation system; All test and appraisal person's fellowships are sued for peace safely in many ways and are added up mark; Realize the secret security score rank of testing and assessing and not needing trusted third party, reduce the intervention of test and appraisal mechanism, guaranteed the privacy of test and appraisal.
(3) the present invention uses the evaluating result data and is separated the method for depositing the test and appraisal data by test and appraisal person's database; On safety is sued for peace the basis of scoring in many ways; Filter out test and appraisal person's identity information; Make and to be checked end product and the test and appraisal details of oneself, but can't see other by test and appraisal person's test and appraisal questionnaire by test and appraisal person.Test and appraisal person can read measured person's gross score rank from the RFID of oneself, but can't extract other test and appraisal persons' concrete test and appraisal questionnaire, has protected test and appraisal person's individual privacy.
Description of drawings
Fig. 1 is based on the online test and appraisal model framework of Internet of Things,
Fig. 2 is based on the online test and appraisal data acquisition figure of Internet of Things,
Storage of Fig. 3 evaluating result and data conversion exemplary plot,
Fig. 4 transmits matrix diagram,
Fig. 5 is based on the safety summation flow chart of scoring in many ways of test and appraisal scene.
Embodiment
In many ways the flow process of calculating the secret protection assessment method based on the safety of Internet of Things scene can be described below:
This scheme is by participating in test and appraisal person, authentication center, registration information data storehouse, test and appraisal database hub, evaluating result database, fractional computation center and formed by these set entities of test and appraisal person's database, and is specifically as shown in Figure 1:
Step 1) is without loss of generality, and supposes to have a n test and appraisal person (n is a positive integer), and these test and appraisal persons use different test and appraisal terminals to test and assess in Internet of Things on the net, and they are with its identify label S iBe stored in the RFID tag RFID of having at its terminal.Use the test and appraisal terminal when testing and assessing test and appraisal person, login system is the RFID label (as shown in Figure 2) of automatic perception user terminal, and extracts its identify label S iCarry out authentication, i=1,2 ..., n.
Step 2) login system uses the certificate authority agreement in the authentication agreement to accomplish verification process, and system gives S iSelect random number r, calculate v=a r(modp), and v and its identification identifier S iIssue the authentication center together, authentication center is to S iProvide identity signing certificate C (A).
Step 3) S iV value in registration information data storehouse forwarding step 2 and identity signing certificate C (A), the registration information data storehouse is through contrast test and appraisal person information database, and the proof procedure approval v and the C (A) of utilization authentication agreement agree S iFurther information typing.
Step 4) test and appraisal person S iIndividual to m by test and appraisal person T jTest and assess, j=1,2 ..., m.Use w IjExpression test and appraisal person S iTo by test and appraisal person T jEvaluating result, simultaneously the registration information data storehouse provides each test and appraisal person S to the test and appraisal database hub iChecking data y iHash operation value H (y i) and the encryption key x of evaluating result IjHash operation value H (x Ij).
Step 5) need be to evaluating result w for the appearance with the phenomenon of stopping to repeat to test and assess of the confidentiality that strengthens the test and appraisal process IjCarry out cryptographic operation.Test and appraisal end S iSend E (w Ij, H (x Ij)) || H (y i) give the test and appraisal database hub, " E " is AES here, " || " is attended operation.Each test and appraisal person's H (y can be in time verified in the registration information data storehouse i) whether legal or repeat, prevent illegal person destruction and the person of participating in evaluation and electing repeat test and appraisal, if repetition arranged then be not counted in the test and appraisal database.
Step 6) test and appraisal database hub will be tested and assessed and held the content of sending to pass to the T by test and appraisal person jDatabase, filter out test and appraisal person's identity information, each is received the decrypted private key that send in the registration information data storehouse by test and appraisal person's database, deciphers all test and appraisal data through checking, obtains test and appraisal person S iTo by test and appraisal person T jEvaluating result w Ij, and send it to the fractional computation center.
Step 7) fractional computation center is to by test and appraisal person T jEvaluating result w IjCorresponding mark carries out summation operation, obtains test and appraisal person S iTo by test and appraisal person T jMark G Ij
Step 8) is with the G that obtains in the step 7 IjBe converted into k position binary sequence form, each test and appraisal person's evaluating result is expressed as G as shown in Figure 3 I1G I2... G ImWherein each is connected storage by test and appraisal person's mark, and these results are kept at the evaluating result database D iIn.
Step 9) is with binary sequence G I1G I2... G ImBe converted into decimal system numerical value P i, and these decimal system numerical value are splitted into n number P at random It, t=1,2 ..., n makes Utilize safe lane with P ItSend to other n-1 evaluating result database D t, t ≠ i.D iAt the P that receives all the other n-1 evaluating result databases TiAfterwards, utilize fractional computation center calculation and formula
Figure BDA0000136414080000092
Its process can be used the transmission matrix notation, and is as shown in Figure 4, wherein i line display D iThe data of sending, the i row are then represented D iThe data that receive (1≤i≤n).
Step 10) D iWith the summed result P ' of oneself iBe broadcast to remaining n-1 evaluating result database.Each D iAfter receiving all the other n-1 evaluating result data of database, calculate it respectively at the fractional computation center, can calculate all test and appraisal achievement sum M:
M = Σ i = 1 n P i ′ = Σ i = 1 n Σ t = 1 n P ti = Σ t = 1 n Σ i = 1 n P ti = Σ t = 1 n P t = Σ i = 1 n P i
Step 11) obtains test and appraisal person S according to step 10 iTo all by test and appraisal person's test and appraisal achievement sum M i, S iCorresponding evaluating result database D iWith M iSend to n-1 evaluating result database; Each D iAll obtain all test and appraisal persons' test and appraisal achievement sum M i
Each evaluating result database D of step 12) iAll M wherein iThe size of value is with M iBe worth identical S iDeposit in the middle of the same set.Compare the element number of each set then, draw the maximum set of element number, S in this set iCorresponding M value is this D iIn final test and appraisal achievement sum.
Step 13) D iM converts binary number to decimal number, and every then k carries out intercepting to M in the position, can obtain respectively all test and appraisal persons to each by test and appraisal person T jLast overall score.Obtain each by test and appraisal person T according to last overall score jLast test and appraisal rank, and this rank and last overall score be sent to all by in test and appraisal person's database.Compared M in test and appraisal person's database use step 12 iThe method that draws the M value is tried to achieve last mark and rank by test and appraisal person, and stores.More than the score flow process is as shown in Figure 5.
Step 14) test and appraisal person is through authentication login evaluation system; Read each by test and appraisal person's total points numerical value and last rank from own corresponding RFID tag RFID; But can't extract other test and appraisal persons' concrete test and appraisal questionnaire, protect test and appraisal person's individual privacy.
Step 15) by test and appraisal person equally through the authentication login system; Check database by test and appraisal person; The test and appraisal final ranking that can see oneself and each test and appraisal person be to own overall merit, and can't see test and appraisal person's identity information and other are by test and appraisal person's evaluating result.Same, other have further been protected by test and appraisal person's individual privacy by the evaluating result that test and appraisal person also can't see him.
Teacher's test and appraisal with certain all course of institute are example; In term Mo; The student of school organization tests and assesses to the teacher of oneself on the net, does the enrollment status that the preceding evaluation system of test and appraisal needs the authentication student, to guarantee what each teacher was tested and assessed by the own student who is taught.
Input: suppose that the test and appraisal questionnaire has 10 problem Q 1, Q 2..., Q 10Describe with 1 overall merit teacher; Total points is 100 minutes; Each problem has and differs from four in good and pass judgment on grades, the corresponding corresponding test and appraisal mark of each grade, promptly 10 minutes, 8 minutes, 6 minutes and 4 minutes; Every part of questionnaire can obtain a last test and appraisal gross score, and the test and appraisal questionnaire is tested and assessed by the student and is delivered to the test and appraisal database hub after fill at the terminal.
Output: each student can see each teacher's of section gross score and final ranking, but can't know other students' concrete questionnaire content; Each teacher can see oneself test and appraisal rank and the student test and appraisal details to it, but can not see student's identity information and other teachers' test and appraisal details, with protection student and other teachers' that participate in evaluation and electing privacy information.
N student of step 1) hypothesis uses different test and appraisal terminal (such as mobile phone, computer, PDA etc.) to test and assess in Internet of Things on the net, and they are with its identify label S iBe stored in the RFID label of having at its terminal, i=1,2 ..., n; RFID tag storage pupilage information, for example student number, name, institute etc.Use the test and appraisal terminal when testing and assessing the student, login system is the RFID label of automatic perception student terminal, and extracts its identify label S iCarry out authentication.
Step 2) login system uses the certificate authority agreement in the authentication agreement to accomplish verification process, and system gives S iSelect random number r, calculate v=a r(modp), and v and its identification identifier S iIssue the authentication center together, authentication center is to S iProvide identity signing certificate C (A).
Step 3) S iV value and the identity signing certificate C (A) of end in registration information data storehouse forwarding step 2.The registration information data storehouse is through contrasting the database that each teacher teaches the student, and the proof of identification process approval v and the C (A) of utilization authentication agreement agree S iFurther information typing, assurance test and appraisal middle school student and teacher's correspondence.
Step 4) student S iThe teacher T that m professor oneself arranged jTest and assess, j=1,2 ..., m promptly answers corresponding 10 test and appraisal problem Q 1, Q 2..., Q 10Describe with 1 overall merit, use w teacher IjExpression student S iTo teacher T jEvaluating result, simultaneously the registration information data storehouse provides each student S to the test and appraisal database hub iChecking data y iHash operation value H (y i) and the encryption key x of evaluating result IjHash operation value H (x Ij).
Step 5) uses the md5 encryption algorithm to evaluating result w for the appearance with the phenomenon of stopping to repeat to test and assess of the confidentiality that strengthens the test and appraisal process IjCarry out cryptographic operation.The student tests and assesses and holds S iSend E (w Ij, H (x Ij)) || H (y i) give the test and appraisal database hub, " E " is AES here, " || " is attended operation.Each student's H (y can be in time verified in the registration information data storehouse i) whether legal or repeat, prevent illegal person's the destruction and the student's that participates in evaluation and electing the test and appraisal that repeat, if repetition is arranged then be not counted in the test and appraisal database.
Step 6) test and appraisal database hub will be tested and assessed and held the content of sending to pass to the T by the test and appraisal teacher jDatabase, filter out student's identity information.Each teacher's database is received the decrypted private key that send in the registration information data storehouse, deciphers all test and appraisal data through checking, obtains each student S iTo teacher T jEvaluating result w Ij, and send it to the fractional computation center.
Step 7) fractional computation center is to teacher T jEvaluating result w IjThe mark of ten corresponding problems carries out summation operation, obtains student S iTo teacher T jMark G Ij
Step 8) is with the G that obtains in the step 7 IjBe converted into k position binary sequence form, each student S iEvaluating result be expressed as G I1G I2... G ImWherein each teacher's mark connects storage, and these results are kept at the evaluating result database D iIn.
Step 9) is with binary sequence G I1G I2... G ImBe converted into decimal system numerical value P i, and these decimal system numerical value are splitted into n number P at random It, t=1,2 ..., n makes
Figure BDA0000136414080000121
Utilize safe lane with P ItSend to other n-1 evaluating result database D t, t ≠ i; D iAt the P that receives all the other n-1 evaluating result databases TiAfterwards, utilize fractional computation center calculation and formula
Figure BDA0000136414080000122
Step 10) D iWith the summed result P ' of oneself iBe broadcast to remaining n-1 evaluating result database.Each D iAfter the result who receives all the other n-1 evaluating result databases, calculate it respectively at the fractional computation center, can calculate all test and appraisal achievement sum M:
M = Σ i = 1 n P i ′ = Σ i = 1 n Σ t = 1 n P ti = Σ t = 1 n Σ i = 1 n P ti = Σ t = 1 n P t = Σ i = 1 n P i
Step 11) obtains student S according to step 10 iTest and appraisal achievement sum M to all teachers i, S iCorresponding evaluating result database D iWith M iSend to n-1 evaluating result database; Each D iAll obtain all teachers' test and appraisal achievement sum M i
Each evaluating result database D of step 12) iAll M wherein iThe size of value is with M iBe worth identical S iDeposit in the middle of the same set.Compare the element number of each set then, draw the maximum set of element number, S in this set iCorresponding M value is this D iIn final test and appraisal mark sum.
Step 13) D iM converts binary number to decimal number, and every then k carries out intercepting to M in the position, can obtain all students respectively to each teacher T jLast overall score.Obtain each teacher T according to last overall score jThe teaching last rank of testing and assessing, and this rank and last overall score be sent in all teacher database.Teacher database is used and is compared M in the step 12 iThe method that draws the M value is tried to achieve last mark of teacher and rank, and stores.
Step 14) student reads each teacher's total points numerical value and last rank, but can't extract other students' concrete test and appraisal questionnaire through authentication login evaluation system from own corresponding RFID tag RFID, protected student's individual privacy.
Step 15) teacher checks the test and appraisal database of oneself equally through the authentication login system, can see oneself final ranking of teaching achievement and the overall merit of each student to oneself, and can't see student's identity information and other teachers' evaluating result.Same, other teachers also can't see his evaluating result, have further protected student and teacher's individual privacy, are convenient to the teacher and further improve teaching.

Claims (1)

1. the safety based on the Internet of Things scene is calculated the secret protection assessment method in many ways; It is characterized in that using authentication agreement and the method for secret protection that calculates in many ways safely; When obtaining correct evaluating result; Protection test and appraisal person and do not revealed by test and appraisal person's privacy information, concrete flow process is following:
Step 1) is without loss of generality, and supposes to have a n test and appraisal person, and these test and appraisal persons use different test and appraisal terminals to test and assess in Internet of Things on the net, and they are with its identify label S iBe stored in the RFID tag RFID of having at its terminal, use the test and appraisal terminal when testing and assessing test and appraisal person, login system is the RFID label of automatic perception user terminal, and extracts its identify label S iCarry out authentication, i=1,2 ..., n;
Step 2) login system uses the certificate authority agreement in the authentication agreement to accomplish verification process, and system gives S iSelect random number r, calculate v=a r(modp), and v and its identification identifier S iIssue the authentication center together, authentication center is to S iProvide identity signing certificate C (A);
Step 3) S iV value and the identity signing certificate C (A) of end in registration information data storehouse forwarding step 2, the registration information data storehouse is through contrast test and appraisal person information database, and the proof procedure approval v and the C (A) of utilization authentication agreement agree S iFurther information typing;
Step 4) test and appraisal person S iIndividual to m by test and appraisal person T jTest and assess, j=1,2 ..., m uses w IjExpression test and appraisal person S iTo by test and appraisal person T jEvaluating result, simultaneously the registration information data storehouse provides each test and appraisal person S to the test and appraisal database hub iChecking data y iHash operation value H (y i) and the encryption key x of evaluating result IjHash operation value H (x Ij);
Step 5) need be to evaluating result w for the appearance with the phenomenon of stopping to repeat to test and assess of the confidentiality that strengthens the test and appraisal process IjCarry out cryptographic operation; Test and appraisal end S iSend E (w Ij, H (x Ij)) || H (y i) give the test and appraisal database hub, " E " is AES here, " || " is attended operation; Each test and appraisal person's H (y can be in time verified in the registration information data storehouse i) whether legal or repeat, prevent illegal person destruction and the person of participating in evaluation and electing repeat test and appraisal, if repetition arranged then be not counted in the test and appraisal database;
Step 6) test and appraisal database hub will be tested and assessed and held the content of sending to pass to the T by test and appraisal person jDatabase, filter out test and appraisal person's identity information, each is received the decrypted private key that send in the registration information data storehouse by test and appraisal person's database, deciphers all test and appraisal data through checking, obtains test and appraisal person S iTo by test and appraisal person T jEvaluating result w Ij, and send it to the fractional computation center;
Step 7) fractional computation center is to by test and appraisal person T jEvaluating result w IjCorresponding mark carries out summation operation, obtains test and appraisal person S iTo by test and appraisal person T jMark G Ij
Step 8) is with the G that obtains in the step 7 IjBe converted into k position binary sequence form, each test and appraisal person's evaluating result is expressed as G I1G I2... G ImWherein each is connected storage by test and appraisal person's mark, and these results are kept at the evaluating result database D iIn;
Step 9) is with binary sequence G I1G I2... G ImBe converted into decimal system numerical value P i, and these decimal system numerical value are splitted into n number P at random It, t=1,2 .., n makes
Figure FDA0000136414070000021
Utilize safe lane with P ItSend to other n-1 evaluating result database D t, t ≠ i; D iAt the P that receives all the other n-1 evaluating result databases TiAfterwards, utilize fractional computation center calculation and formula
Figure FDA0000136414070000022
Step 10) D iWith the summed result P ' of oneself iBe broadcast to remaining n-1 evaluating result database; Each D iAfter receiving all the other n-1 evaluating result data of database, calculate it respectively at the fractional computation center, can calculate all test and appraisal achievement sum M:
M = Σ i = 1 n P i ′ = Σ i = 1 n Σ t = 1 n P ti = Σ t = 1 n Σ i = 1 n P ti = Σ t = 1 n P t = Σ i = 1 n P i
Step 11) obtains test and appraisal person S according to step 10 iTo all by test and appraisal person's test and appraisal achievement sum M i, S iCorresponding evaluating result database D iWith M iSend to remaining n-1 evaluating result database; Each D iAll obtain all test and appraisal persons' test and appraisal achievement sum M i
Each evaluating result database D of step 12) iAll M wherein iThe size of value is with M iBe worth identical S iDeposit in the middle of the same set, compare the element number of each set then, draw the maximum set of element number, S in this set iCorresponding M value is this D iIn final test and appraisal mark sum;
Step 13) D iM converts binary number to decimal number, and every then k carries out intercepting to M in the position, can obtain respectively all test and appraisal persons to each by test and appraisal person T jLast overall score.Obtain each by test and appraisal person T according to last overall score jLast test and appraisal rank, and this rank and last overall score be sent to all by in test and appraisal person's database.Compared M in test and appraisal person's database use step 12 iThe method that draws the M value is tried to achieve last mark and rank by test and appraisal person, and stores;
Step 14) test and appraisal person logins evaluation system by authentication; Read each measured person's total points numerical value and last rank from own corresponding RFID tag RFID; But can't extract other test and appraisal persons' concrete test and appraisal questionnaire, protect test and appraisal person's individual privacy;
Step 15) by test and appraisal person equally through the authentication login system; Check database by test and appraisal person; The test and appraisal final ranking that can see oneself and each test and appraisal person be to own overall merit, and identity information and other that can't see test and appraisal person are same by test and appraisal person's evaluating result; Other have further been protected by test and appraisal person's individual privacy by the evaluating result that test and appraisal person also can't see him.
CN201210036339.8A 2012-02-17 2012-02-17 Secure multi-party computation privacy-protecting evaluation method based on scenes of internet of things Active CN102594820B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210036339.8A CN102594820B (en) 2012-02-17 2012-02-17 Secure multi-party computation privacy-protecting evaluation method based on scenes of internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210036339.8A CN102594820B (en) 2012-02-17 2012-02-17 Secure multi-party computation privacy-protecting evaluation method based on scenes of internet of things

Publications (2)

Publication Number Publication Date
CN102594820A true CN102594820A (en) 2012-07-18
CN102594820B CN102594820B (en) 2014-09-10

Family

ID=46483021

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210036339.8A Active CN102594820B (en) 2012-02-17 2012-02-17 Secure multi-party computation privacy-protecting evaluation method based on scenes of internet of things

Country Status (1)

Country Link
CN (1) CN102594820B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103200184A (en) * 2013-03-14 2013-07-10 电子科技大学 Evaluation method for mobile terminal security
WO2015042808A1 (en) * 2013-09-25 2015-04-02 Thomson Licensing Method and device for protecting private information
CN106453343A (en) * 2016-10-21 2017-02-22 过冬 An IOT safety evaluation method
CN106844473A (en) * 2016-12-23 2017-06-13 明博教育科技股份有限公司 A kind of evaluation of teacher's analysis method based on micro services framework
CN107302535A (en) * 2017-06-28 2017-10-27 深圳市欧乐在线技术发展有限公司 A kind of access authentication method and device
WO2017190281A1 (en) * 2016-05-04 2017-11-09 汤美 Method and system for online teacher lecturing evaluation
CN108471402A (en) * 2018-02-11 2018-08-31 安徽师范大学 Internet of Things identity identifying method based on connector secret signal anonymity
CN109446828A (en) * 2018-11-07 2019-03-08 北京邮电大学 A kind of multi-party computations method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1804886A (en) * 2006-01-24 2006-07-19 浙江大学 Distributed type private and protected data digging based enterprise credit evaluation method
US20080304657A1 (en) * 2005-12-13 2008-12-11 Koninklijke Philips Electronics, N.V. Secure Threshold Decryption Protocol Computation
CN102196431A (en) * 2011-05-13 2011-09-21 南京邮电大学 Internet of things application scene-based protection method of privacy query and private identity verification

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080304657A1 (en) * 2005-12-13 2008-12-11 Koninklijke Philips Electronics, N.V. Secure Threshold Decryption Protocol Computation
CN1804886A (en) * 2006-01-24 2006-07-19 浙江大学 Distributed type private and protected data digging based enterprise credit evaluation method
CN102196431A (en) * 2011-05-13 2011-09-21 南京邮电大学 Internet of things application scene-based protection method of privacy query and private identity verification

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103200184A (en) * 2013-03-14 2013-07-10 电子科技大学 Evaluation method for mobile terminal security
CN103200184B (en) * 2013-03-14 2016-04-20 电子科技大学 A kind of mobile terminal safety assessment method
WO2015042808A1 (en) * 2013-09-25 2015-04-02 Thomson Licensing Method and device for protecting private information
WO2017190281A1 (en) * 2016-05-04 2017-11-09 汤美 Method and system for online teacher lecturing evaluation
CN106453343A (en) * 2016-10-21 2017-02-22 过冬 An IOT safety evaluation method
CN106844473A (en) * 2016-12-23 2017-06-13 明博教育科技股份有限公司 A kind of evaluation of teacher's analysis method based on micro services framework
CN107302535A (en) * 2017-06-28 2017-10-27 深圳市欧乐在线技术发展有限公司 A kind of access authentication method and device
CN108471402A (en) * 2018-02-11 2018-08-31 安徽师范大学 Internet of Things identity identifying method based on connector secret signal anonymity
CN108471402B (en) * 2018-02-11 2021-02-09 安徽师范大学 Internet of things identity authentication method based on joint secret number anonymity
CN109446828A (en) * 2018-11-07 2019-03-08 北京邮电大学 A kind of multi-party computations method and device
CN109446828B (en) * 2018-11-07 2020-10-13 北京邮电大学 Secure multi-party computing method and device

Also Published As

Publication number Publication date
CN102594820B (en) 2014-09-10

Similar Documents

Publication Publication Date Title
CN102594820B (en) Secure multi-party computation privacy-protecting evaluation method based on scenes of internet of things
Liu et al. Privacy-preserving COVID-19 contact tracing app: a zero-knowledge proof approach
CN109523683B (en) Anonymous electronic voting method based on block chain technology
Huang et al. Blockchain-based multiple groups data sharing with anonymity and traceability
CN103095453A (en) Public-key Encrypted Bloom Filters With Applications To Private Set Intersection
CN112600675B (en) Electronic voting method and device based on group signature, electronic equipment and storage medium
Agate et al. SecureBallot: A secure open source e-Voting system
Will et al. Secure voting in the cloud using homomorphic encryption and mobile agents
Saqib et al. Anonymous and formally verified dual signature based online e-voting protocol
Wu et al. A blockchain-based network security mechanism for voting systems
Li et al. LaT-Voting: Traceable anonymous E-voting on blockchain
Hsiao et al. Electronic voting systems for defending free will and resisting bribery and coercion based on ring anonymous signcryption scheme
Yuan et al. A universally composable secure grouping‐proof protocol for RFID tags
Saputri et al. E-voting security system for the election of EEPIS BEM president
CN116318901A (en) Privacy and verifiable internet of things data aggregation method integrating blockchain
Mengjun et al. Privacy-preserving distributed location proof generating system
Jingzhong et al. Electronic voting protocol based on ring signature and secure multi-party computing
Al-Janabi et al. Security of internet voting schemes: A survey
Carbunar et al. ${\rm PROFIL} _ {R} $: Toward Preserving Privacy and Functionality in Geosocial Networks
Eldridge A trustworthy electronic voting system for australian federal elections
Dewangan et al. Enhanced Privacy and Security of Voters' Identity in an Interplanetary File System-Based E-Voting Process
Chowdhury Perceptions of purple teams among cybersecurity professionals
Lee et al. Security Analysis of Authentication and Key Agreement for Internet of Drones
Bingol et al. Norwegian Internet Voting Protocol Revisited: Security and Privacy Enhancements
Biswas Gsm verification based secure e-voting framework

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20120718

Assignee: Jiangsu Nanyou IOT Technology Park Ltd.

Assignor: Nanjing Post & Telecommunication Univ.

Contract record no.: 2016320000219

Denomination of invention: Secure multi-party computation privacy-protecting evaluation method based on scenes of internet of things

Granted publication date: 20140910

License type: Common License

Record date: 20161121

LICC Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model
EC01 Cancellation of recordation of patent licensing contract
EC01 Cancellation of recordation of patent licensing contract

Assignee: Jiangsu Nanyou IOT Technology Park Ltd.

Assignor: Nanjing Post & Telecommunication Univ.

Contract record no.: 2016320000219

Date of cancellation: 20180116

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20180502

Address after: 510000 room 610, A building, Vanke cloud Plaza, 1933 Hua Guan Road, Tianhe District, Guangzhou, Guangdong.

Patentee after: Shang Yang Polytron Technologies Inc

Address before: 210003 new model road, Nanjing, Nanjing, Jiangsu

Patentee before: Nanjing Post & Telecommunication Univ.