CN108055194A - Multi-tag and the newer method for secret protection of user are supported in microblog system - Google Patents

Multi-tag and the newer method for secret protection of user are supported in microblog system Download PDF

Info

Publication number
CN108055194A
CN108055194A CN201711335877.6A CN201711335877A CN108055194A CN 108055194 A CN108055194 A CN 108055194A CN 201711335877 A CN201711335877 A CN 201711335877A CN 108055194 A CN108055194 A CN 108055194A
Authority
CN
China
Prior art keywords
blogger
service platform
microblog
vermicelli
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711335877.6A
Other languages
Chinese (zh)
Other versions
CN108055194B (en
Inventor
谢满德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Gongshang University
Original Assignee
Zhejiang Gongshang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Gongshang University filed Critical Zhejiang Gongshang University
Priority to CN201711335877.6A priority Critical patent/CN108055194B/en
Publication of CN108055194A publication Critical patent/CN108055194A/en
Application granted granted Critical
Publication of CN108055194B publication Critical patent/CN108055194B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Algebra (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses multi-tag and the newer method for secret protection of user are supported in a kind of microblog system; the described method includes bloger, bean vermicelli and the microblogging service platforms communicated to connect with the bloger and bean vermicelli; the bloger, bean vermicelli are registered respectively in the microblogging service platform, and the method further includes:The bloger establishes the concern relation of the two with the bean vermicelli using elliptic curve key exchange algorithm;Based on the concern relation, after the examination & verification success of the microblogging service platform, the bean vermicelli obtains the information of bloger's issue;The new signature that the microblogging service platform is sent based on the bloger re-establishes the concern relation between the bloger and bean vermicelli using elliptic curve key exchange algorithm.This method protects the privacy of bean vermicelli in the case where ensuring platform by set model correctly operation.

Description

Privacy protection method supporting multi-label and user updating in microblog system
Technical Field
The invention belongs to the technical field of information security, and particularly relates to a privacy protection method for supporting multi-label and user updating in a microblog system.
Background
The microblog system is taken as a typical social network application, and the user privacy protection problem is always a concern in academic circles. The most different point of social network data from traditional data is in the characteristics of unstructured data and graphs, so that some traditional privacy protection technologies cannot meet the privacy protection requirement of the social network.
Emiliano De Cristofaro et al provides a privacy protection scheme named Hummingbird for privacy problems faced by Twitter, a micro-blog type social network, and the scheme realizes all confidential culture functions of all information in the transmission and storage processes on the basis of RSA blind signature, thereby preventing threats brought by server internal attacks to user privacy. Zhou et al propose to utilize k-anonymity methods to solve the problem of proximity attacks against social networks for structural features of social networks, and the solution does not affect aggregated queries against social networks. Leucio Antonio Cutillo et al proposes a privacy protection scheme for decentralized social networks called Safebook, which provides effective trust relationship management and improves the cooperative property between legal nodes.
There are also many scholars who have suggested some improvements to the privacy preservation status of the social platform currently in commercial operation. Pang et al propose an improved privacy protection scheme for Facebook-like social platforms that improves the access control model of existing social platforms and allows users more autonomous control over privacy. For the current situation, fang and the like propose a privacy wizard (privacy wizard) model which integrates a K-proximity clustering algorithm and a decision tree algorithm into a privacy policy control process and automatically completes privacy policy setting according to user behaviors.
With the popularity of mobile computing devices, such as smartphones, many social networking services are beginning to migrate to the mobile side as well. In such a case, the traditional social network privacy protection policy will be limited by the computing performance and power consumption of the mobile end. He provides a privacy protection strategy aiming at the requirement of low power consumption of a mobile computing platform, and the strategy provides that a CP-ABE ciphertext is converted into an El-Gamel ciphertext by a cloud end, so that the mobile equipment can perform decryption operation at lower power consumption cost.
The traditional popular microblog system can be divided into a blogger, a fan and a microblog service platform in terms of roles. The operation process of the service can be summarized as follows:
(1) Bo owner and fan are first registered on the microblog service platform.
(2) The blog host can release blog article type labels such as Stock, food, travel and health care on the microblog service platform at an unscheduled period, and each blog article can be marked through the labels. Tags for identifying microblog content or important information, such as Stock, food, travel, health care and the like, are called HashTag, and are abbreviated as HT hereinafter. In particular, a blog may be identified by a plurality of tags, such as by HT 1 ,HT 2 ,…, HT n To mark a micro-blog.
(3) The vermicelli applies attention authorization to the blogger through the microblog service platform according to the blogger's own attention label such as Stock, food or travel, and one vermicelli can pay attention to a plurality of blogger labels (recorded as HT) 1 ,HT 2 ,…,HT n ) It is of course also possible that these labels are marked with the same blog article.
(4) After receiving the fan application, the blogger reviews the qualification and determines whether to approve attention.
(5) Bloggers issue bloggers and may be tagged with multiple HT's.
(6) And the microblog service platform transfers the blog articles to all users paying attention to the blog articles of the blogger.
(7) And the fan successfully receives the blog articles pushed by the microblog service platform.
In the process, serious privacy information leakage exists, and the following three aspects are mainly adopted:
(1) The fan privacy information is disclosed to the microblog service platform. After entering the microblog service platform, the user needs the microblog service platform to help forward the attention application, match and forward the blog article, so that the privacy information of the user, such as fan hobbies, political tendencies or physical states, can be completely disclosed to the microblog service platform.
(2) The privacy information of the vermicelli is revealed to the bloggers. When the attention application is submitted, the blogger can accurately know which kind of blogged text the fan paying attention to, and therefore the privacy information of the user is also revealed to the blogger.
(3) The information of the bloggers is revealed to the microblog service platform. The microblog service platform bears the pairing task of the bloggers and the fans, so that the bloggers of the microblog service platform are transparent to the microblog service platform.
Disclosure of Invention
The invention aims to provide a privacy protection method for supporting multi-label and user updating in a microblog system, which can protect the privacy of fans under the condition of ensuring that a platform operates correctly according to a set model.
In order to achieve the purpose, the invention provides the following technical scheme:
a privacy protection method supporting multi-label and user updating in a microblog system comprises a blogger, fans and a microblog service platform in communication connection with the blogger and the fans, wherein the blogger and the fans are respectively registered in the microblog service platform, and the method further comprises the following steps:
the blogger and the fan establish the attention relationship between the blogger and the fan by using an elliptic curve key exchange algorithm;
based on the concern relationship, after the microblog service platform is successfully audited, the fan obtains the information issued by the blogger;
and the microblog service platform reestablishes the attention relationship between the bloggers and the fans by utilizing an elliptic curve key exchange algorithm based on the new signature sent by the bloggers.
According to the invention, by means of the existing modern cryptographic technologies such as elliptic curves and the like, the problem that the blogger completes authorization without knowing specific attention information of the fans is solved, the microblog service platform performs correct blind matching and data forwarding without knowing any attention information, and the fans can correctly receive and read blogged texts without revealing any privacy. Particularly, the method can correctly process the vermicelli to pay attention to various blog article types at one time, and the blogger can effectively cancel the attention of the user after the vermicelli is overdue, such as under the condition of no renewal.
Preferably, before establishing the concern relationship, the microblog service platform initializes the system, selects an elliptic curve as a basis of an elliptic curve key exchange algorithm in the whole system, and publishes a parameter T = (q, a, b, G, n, h) of the selected elliptic curve. The initialization of the microblog service platform lays a foundation for the subsequent establishment of the concern relationship and the forwarding of the blog, and the stability and the confidentiality of the whole method are improved.
Preferably, the establishing of the attention relationship between the blogger and the fan by using an elliptic curve key exchange algorithm comprises the following steps:
(a) The fans send attention request messages (fans, bloggers and U) containing encryption information U to the microblog service platform for storage, wherein the encryption information U = { mu = i ,i=1,2,…,N},μ i =F(H(tag i ) R, where r is a random number generated by vermicelli, tag i Labeling Bowen type, H () is a hash function, F () is a function that encodes data to a point on an elliptic curve;
(b) After the blogger is on line, the microblog service platform forwards the attention request message (vermicelli, blogger, U) to the blogger;
(c) After the owner passes the qualification verification of the bean vermicelli, the blindly signing is carried out on the encryption information U to generate blindly signed information U '= { mu' = i ′,i=1,2,…,N},μ i ′=xμ i And returning a request response message (fan, blogger, U ') containing the blind signature information U' to the microblog service platform for storage, wherein x is a random number generated by the blogger;
(d) After the fan receives the request response message (fan, blogger, U ') forwarded by the microblog service platform, the blind signature information U' is subjected to blind removal operation to obtain a signature hash value T, the message (blogger, TAGS, delta, T) is stored, and a confirmation attention message (fan, blogger, T) containing the signature hash value T is sent to the microblog service platform to be stored, so that the establishment of the attention relationship is completed;
wherein TAGS = { tag = { (tag) i ,i=1,2,…,N},Δ={δ i ,i=1,2,…,N}, T={t i ,i=1,2,…,N},tag i ,δ i And t i Has a one-to-one correspondence relationship.
Preferably, the approval of the blog for the fan qualification comprises:
if the vermicelli pays corresponding fees, the vermicelli qualification is approved; or the like, or, alternatively,
and if the vermicelli meets the auditing conditions customized by the blogger, the vermicelli qualification is approved.
The above-mentioned auditing conditions are contents set by the information publisher according to the self-intention, and are not limited here.
Preferably, the performing a busy removing operation on the blind signature information, and obtaining the signature hash value T includes:
calculating the signature delta i =r -1 μ i ′(mod q),μ i ' (mod q) is a modulo operation;
computing a signed hash value t i =H 2i ),H 2 () is a hash function.
Preferably, the obtaining, by the fan, the information issued by the blogger after the audit of the microblog service platform is successful based on the concern relationship includes:
(a) The blogger release contains blog info e KEYS, signed Hash value T * Information (info) of e ,KEYS,T * ) Accessing the microblog service platform;
(b) The microblog service platform compares records in (A, B, T) format stored in the attention relationship establishing stage, and judges that the condition (B = Bo owner)' Lambda (T ^ T) is met *) Then, a message (info) is sent e ,encKey i Bo Zhu, t i ) To the vermicelli, wherein, encKey i Is and t i Have a corresponding relationship;
(c) Message (info) received by the vermicelli pair e ,encKey i Bo Zhu, t i ) To carry outDecoding to obtain Bowen.
Further, the blog info e KEYS, signed Hash value T * Obtained by the following method:
info e =AESEnc key (info p )
KEYS={enckey i ,i=1,2,...,N}
wherein, info p In Bowen, H (. X.), H 2 (*)、H 1 (. One) are hash functions different from each other, AESEnc key (-) denotes the AES encryption algorithm with key as key,is shown inFor the AES encryption algorithm of the key, encKey i Is the ith encrypted key.
Preferably, said pair of received messages (info) e encKey, bo owner, t) to obtain Bo Wen bagComprises the following steps:
and recovering the AES encryption key:
k i =H 1i )
wherein the content of the first and second substances,representing passage of a key k i Carrying out AES decryption operation;
according to the obtained key, the blog info is obtained through an AES decryption algorithm p
Wherein, AESDec key (-) denotes AES decryption operation by key.
Preferably, the reestablishing, by the microblog service platform, the concern relationship between the blogger and the fan by using an elliptic curve key exchange algorithm based on the new signature sent by the blogger includes:
(a) The blogger generates and saves a new random number x', calculates a new signature c = x -1 x (mod n) and sending a key change request message (Bob, c, S) containing the new signature c and the continuation fan S to the microblog service platform, wherein S =<(User 1 ,T 1 ),(User 2 ,T 2 ),…,(User m ,T m )>, User m Denotes the m-th vermicelli, T m Represent and User m A corresponding signature hash value;
(b) After the fans waiting for appointment making are on line, the microblog service platform sends a message requiring appointment making to the fans waiting for appointment making;
(c) The continuous vermicelli generates a new random number r # CalculatingAnd sends the encrypted informationAccessing the microblog service platform;
(d) Encryption information U received by the microblog service platform # ComputingAnd will blind sign informationReturning to the continuing vermicelli;
(e) The renewal fan is based on the received U #′ ComputingAndthe local store (blogger, TAGS, delta) is then updated # ,T # ) And sends the hash value T # And storing the information to the microblog service platform to finish reestablishing the attention relationship between the bloggers and the fans.
In the technical scheme, because the blind signature is adopted, the blogger only knows that a fan pays attention to the blogger, but does not know which kind of information the fan pays attention to, so that the confidentiality of the information paid attention to by the fan can be ensured. If the fans are due or owed, the owner cancels the attention of the fans which do not renew or meet the requirements in a key updating mode, and the fans cannot be decrypted correctly after the next message is released.
Compared with the prior art, the invention has the advantages that:
1) The privacy of the vermicelli is protected. Because the attention request is encrypted information, the microblog service platform can store and forward the encrypted information but cannot obtain the original information; the blogger is a blind signature of the encrypted request for attention, so the blogger only knows that a certain user is paying attention to him, but not which kind of live broadcast he is paying attention to.
2) The privacy of the blogger is protected. Because the blog text is encrypted information, the microblog service platform can store, match and forward the blog text, but the original information of the blog text cannot be obtained, the fan can decrypt only the user who obtains the authorization attention, and the unauthorized user cannot decrypt.
3) The fans and the bloggers in the system can be out of synchronization, namely, the fan and the bloggers do not need to be on line at the same time, and the establishment of the attention relationship is completed in an asynchronous mode. This greatly extends the scope of use of the invention.
4) The fans can pay attention to a plurality of keywords tag for marking the blog, the blogger can release the blog marked by the keywords, and the microblog service platform can correctly match and forward the blog to all fans paying attention to the blog (possibly, the marks HT paid attention by the fans are different).
5) The doctor can cancel the attention of the fans who do not renew or meet the requirements in a key updating mode, and other fans can still watch the blog article normally.
Drawings
Fig. 1 is a flowchart of a privacy protection method supporting multiple tags and user updating in a microblog system according to this embodiment;
fig. 2 is a flowchart illustrating a key exchange process according to this embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the detailed description and specific examples, while indicating the scope of the invention, are intended for purposes of illustration only and are not intended to limit the scope of the invention.
Fig. 1 is a flowchart of a privacy protection method for supporting multiple tags and user updating in a microblog system provided by this embodiment. Referring to fig. 1, the privacy protecting method includes the following five stages:
the first stage is as follows: protocol initialization and user registration, wherein the protocol initialization and the user registration are mainly used for completing parameters required by the protocol, and the blogger and the fan register on the microblog service platform.
And a second stage: and establishing an attention relationship, initiating an attention request to the blogger by the fan in the stage through an attention request message containing tag, and auditing and confirming the attention request by the blogger. In the process, a key exchange algorithm based on an elliptic curve is completed.
And a third stage: and (4) the blogger issues bloggers, the microblog service platform completes the blog blind matching based on tag under the condition that the content of the tag plaintext cannot be obtained, and forwards the matched bloggers to the corresponding vermicelli. The blog article is encrypted by the AES algorithm before being released and stored.
A fourth stage: the vermicelli receives and decodes the blog.
The fifth stage: and (4) replacing the key, namely when the blog owner wants to remove the attention of some fans, distributing a new encryption key to other normal fans, wherein the process is completed by the microblog service platform on the premise of not acquiring the information related to the tag and the old key.
The first phase mainly includes system initialization and user initialization. The specific process is as follows:
when the method is deployed on a microblog service platform, system initialization is required. When the system is initialized, the microblog service platform selects an elliptic curve as the basis of an elliptic curve key exchange algorithm in the whole system, and publishes the parameter T = (q, a, b, G, n, h) of the selected elliptic curve. Where q, a, b define an expression for an elliptic curve. G is an arbitrary point on the elliptic curve, called the base point, on which the key generation and encryption operations in elliptic curve cryptography are based, n is the order of the base point G, andthe ratio of the elliptic curve step to the base point step is shown. The system initialization process is only performed once at system deployment.
The fan and the gambler first register with the user to obtain login credentials, and when the gambler registers, user initialization is required. Initially, the user generates a random number x as his id by the blogger Bob. The id is only owned by the doctor Bob, and the platform and fans do not know the value.
After the protocol initialization and user registration stages are finished, the second stage, namely the attention relationship establishing stage, is carried out. In the process, the tool of the elliptic curve encryption algorithm is mainly used, and compared with the tool of RSA blind signature and the like, the tool greatly improves the algorithm efficiency, can effectively improve the use effect of the patent, and expands the application range of the invention. The specific process of this stage is:
s201: the vermicelli Alice sends some kind of blog article expected to pay attention to the blogger Bob to the microblog service platform (assuming that the blogger is marked by TAGS = { tag = { tag }) i I =1,2, …, N } where N represents the number of tags). Specifically, vermicelli Alice selects a random number r and calculates μ i =F(H(tag i ) R, i =1,2, …, N, where H (×) is a hash function and F (×) is a function that encodes data to a point on an elliptic curve. Then, alice sends an attention request message in the format of (Alice, bob, U) to the microblog service platform, where U = { μ = { μ = } i ,i=1,2,…,N}。
S202: the microblog service platform stores the attention request message (Alice, bob, U). And after the blogger Bob comes online, the microblog service platform forwards the request message (Alice, bob, U) to the blogger Bob.
S203: the doctor Bob carries out qualification examination on the fan Alice, and if the doctor Bob agrees to pay attention to the fan Alice, blind signature information mu is calculated i ′=xμ i I =1,2, …, N, and sends a request response message in the format (Alice, bob, U ') to the microblog service platform, where U' = { μ = { (U) } i ′,i=1,2,…,N}。
S204: and the microblog service platform stores the request response message (Alice, bob, U '), and forwards the request response message (Alice, bob, U') to the vermicelli Alice after the vermicelli Alice goes online.
S205: after the vermicelli Alice obtains the request response message (Alice, bob, U'), it calculates: delta i =r -1 μ i ' (mod q) and a hash value t of the signature delta i =H 2i ) Then, the vermicelli Alice stores the message (Bob, TAGS, Δ, T), wherein TAGS = { tag = { (T) i ,i=1,2,…,N},Δ={δ i ,i= 1,2,…,N},T={t i ,i=1,2,…,N},tag i ,δ i And t i Having a one-to-one correspondence relationship, and simultaneously sending a confirmation attention message (Alice, bob, T) to the microblog service platform, wherein H 2 And (×) is another hash function different from H (×). The hash function referred to in the present invention may be any effective hash function.
S206: the microblog service platform stores confirmation attention messages (Alice, bob, T) for later blind matching.
Therefore, the vermicelli Alice and the doctor Bob establish an attention relationship.
On the basis of establishing the attention relationship, issuing the blog article, and the specific process is as follows:
s301: the blog text that Bob of the record blogger needs to release is info p ,(info p Access address containing information stream), using tag i The representation describes the ith of the microblog's tags. Before the message is issued, the bos Bob preferably selects a random number key as a key for AES encryption, and encrypts the message plaintext by using an AES encryption algorithm to obtain ciphertext info e
info e =AESEnc key (info p )(1)
S302: first, the blogger Bob performs the following calculations:
wherein H 1 Is different from H 2 (ii) another hash function of (x),
AESEnc key (-) denotes AES encryption algorithm with key as key,is shown inIs an AES encryption algorithm for the key and,
then, the blogger Bob sends a message (info) to the microblog service platform e ,KEYS,T * ). Wherein KEYS = { enckey = i ,i=1,2,…,N},Wherein encKey i Andis in a one-to-one correspondence.
S303: information (info) received by microblog service platform e ,KEYS,T * ) Then, first, the information (info) is stored e ,KEYS,T * ) Comparing with the record in the (A, B, T) format stored in the attention relationship establishment stage, such as (Alice, bob, T), if the following conditions are met:
then the vermicelli Alice pays attention to the microblog issued by the blogger Bob, the matching is successful, and the microblog service platform sends a message (info) e ,encKey i ,Bob,t i ) Forwarded to Alice, wherein encKey i Is and t i Have a corresponding relationship.
In this embodiment, the pseudo code of the blog issuing process is described as follows:
on the basis of information release, the receipt and decoding of the blog text are carried out, and the specific process is as follows:
s401: vermicelli Alice receives the message (info) e ,encKey i ,Bob,t i ) Find T in local store corresponding to (Bob, T) i And delta i The AES encryption key is recovered by the following calculation:
k i =H 1i )(7)
if the unauthorized user acquires the message due to the error or network attack in the system execution process, the fan is not associated with (Bob, t) i ) Corresponding delta i Therefore, k cannot be calculated i And decrypt the key, so the fan cannot decrypt the message plaintext correctly, and the content of the blog cannot be decoded and read.
S402: according to the obtained key, ciphertext info is decrypted by an AES decryption algorithm by adopting the formula (9) e Decrypting to obtain the plaintext info of the Bowen p
info p =AESDec key (info e )(9)
Therefore, the vermicelli correctly receives and decodes the blog information and obtains the blog plaintext info p
In this embodiment, the pseudo code for bosom reception and decoding is described as follows:
the blogger may withdraw the fans of interest for arrearage reasons and the like. Specifically, a method of changing the key is adopted, the process is similar to the process of reestablishing the concern relationship, but the process is transparent to the fans, and all calculation is mainly completed by the microblog service platform. In the whole process, the microblog service platform cannot obtain any information related to the tag and the old key. The flow of the key exchange process is shown in fig. 2, and the specific steps are as follows:
s501: the Bob generates and saves a new random ID x', and then calculates c = x -1 x′(mod n)。
S502: and the doctor Bob initiates a key exchange request to the microblog service platform. Assume that Bob requires a contract with the following user:
S=<(User 1 ,T 1 ),(User 2 ,T 2 ),…,(User m ,T m )>(10)
the blogger Bob sends a message (Bob, c, S) to the microblog service platform.
S503: the microblog service platform saves the message (Bob, c, subscribe) and waits for the user in the subscribe to go online.
S504: if Alice meets the requirement of renewal, namely (Alice, T) belongs to the SUBSCRIBERS, the next time Alice gets online, the Alice receives a message that the microblog service platform requires the renewal of the Alice. At this time, alice needs to select a new random number r # And calculateThe result of the calculation And sending the information to a microblog service platform.
S505: the microblog service platform receives U # Post-calculationAnd will be Sending back the powder wire Alice.
S506: vermicelli Alice obtains U #′ After that, calculate:andthen vermicelli Alice updates the local storage as (Bob, TAGS, Δ) # ,T # ) And sending T to the microblog service platform #
S507: microblog service platform stores messages (Alice, bob, T) # ) And finishing the key replacing process.
In the embodiment, the privacy exchange algorithm based on the elliptic curve and the AES symmetric key encryption algorithm are utilized to solve the problem that the blogger Bob completes authorization without knowing specific information of interest of the user, the microblog service platform performs correct blind matching and data forwarding without knowing any information of interest, and the user can correctly receive and acquire information without revealing any privacy.
The technical solutions and advantages of the present invention have been described in detail in the foregoing detailed description, and it should be understood that the above description is only the most preferred embodiment of the present invention, and is not intended to limit the present invention, and any modifications, additions, and equivalents made within the scope of the principles of the present invention should be included in the protection scope of the present invention.

Claims (9)

1. A privacy protection method supporting multi-label and user update in a microblog system comprises a blogger, fans and a microblog service platform in communication connection with both the blogger and the fans, wherein the blogger and the fans are respectively registered in the microblog service platform, and the method is characterized by further comprising the following steps:
the blogger and the fan establish the concern relationship of the blogger and the fan by using an elliptic curve key exchange algorithm;
based on the concern relationship, after the microblog service platform is successfully audited, the fan obtains the information issued by the blogger;
and the microblog service platform reestablishes the attention relationship between the bloggers and the fans by utilizing an elliptic curve key exchange algorithm based on the new signature sent by the bloggers.
2. The privacy protection method for supporting multi-tag and user update in a microblog system according to claim 1, wherein before establishing the concern relationship, the microblog service platform initializes the system, selects an elliptic curve as a basis of an elliptic curve key exchange algorithm in the entire system, and publishes a parameter T = (q, a, b, G, n, h) of the selected elliptic curve.
3. The privacy protection method for supporting multi-label and user update in a microblog system according to claim 1, wherein the establishing of the attention relationship between the blogger and the fan by using an elliptic curve key exchange algorithm comprises the following steps:
(a) The fans send attention request messages (fans, bloggers and U) containing encryption information U to the microblog service platform for storage, wherein the encryption information U = { mu = i ,i=1,2,...,N},μ i =F(H(tag i ) R, where r is a random number generated by vermicelli, tag i Labeling Bowen type, H () is a hash function, F () is a function that encodes data to a point on an elliptic curve;
(b) After the blogger is on line, the microblog service platform forwards the attention request message (vermicelli, blogger, U) to the blogger;
(c) After the blog owner passes the qualification verification of the vermicelli, blind signature is carried out on the encryption information U to generate blind signature information U '= { mu' i ,i=1,2,...,N},μ′ i =xμ i And returning a request containing the blind signature information UResponding the message (fan, blogger, U') to the microblog service platform for storage, wherein x is a random number generated by the blogger;
(d) After the fan receives the request response message (fan, blogger, U ') forwarded by the microblog service platform, the blind signature information U' is subjected to blind removal operation to obtain a signature hash value T, the message (blogger, TAGS, delta, T) is stored, and a confirmation attention message (fan, blogger, T) containing the signature hash value T is sent to the microblog service platform to be stored, so that the establishment of the attention relationship is completed;
wherein TAGS = { tag = { (tag) i ,i=1,2,...,N},Δ={δ i ,i=1,2,...,N},T={t i ,i=1,2,...,N},tag i ,δ i And t i Has a one-to-one correspondence relationship.
4. The privacy protection method for supporting multi-label and user update in a microblog system according to claim 3, wherein the step of performing a busy removal operation on the blind signature information to obtain a signature hash value T comprises:
calculating the signature delta i =r-1μ′ i (mod q),μ′ i (mod q) is a modulo operation;
computing a signed hash value t i =H 2i ),H 2 () is a hash function.
5. The privacy protection method for supporting multi-label and user update in a microblog system according to claim 3 or 4, wherein the obtaining, by the fan, the information issued by the blogger after the examination of the microblog service platform is successful based on the concern relationship comprises:
(a) The blogger release contains blog info e KEYS, signed Hash value T * Information (info) of e ,KEYS,T * ) Accessing the microblog service platform;
(b) The microblog service platform compares the records in the (A, B, T) format stored in the attention relationship establishing stage, and judges that the records meet the conditionsThen, a message (info) is sent e ,encKey i Bo Zhu, t i ) To the vermicelli, wherein, encKey i Is and t i Have a corresponding relationship;
(c) Message (info) received by the vermicelli pair e ,encKey i Bo Zhu, t i ) And decoding to obtain the Bowen.
6. The privacy preserving method for supporting multi-tag and user update in a microblog system according to claim 5, wherein the blog info is e KEYS, signed Hash value T * Obtained by the following steps:
wherein, info p In Bowen, H (. X.), H 2 (*)、H 1 (. One) are hash functions different from each other, AESEnc key (-) denotes the AES encryption algorithm with key as key,is shown inFor the AES encryption algorithm of the key, encKey i Is the ith encrypted key.
7. The privacy protection method for supporting multi-tag and user update in a microblog system according to claim 5, wherein the decoding the received message (info, encKey, blogger, t) to obtain a blogged message comprises:
and recovering the AES encryption key:
k i =H 1i )
wherein the content of the first and second substances,representing passage of a key k i Carrying out AES decryption operation;
according to the obtained key, the blog info is obtained through an AES decryption algorithm p
info p =AESDec key (info e )
Wherein, AESDec key (-) denotes AES decryption operation by key.
8. The privacy protection method for supporting multi-label and user update in a microblog system according to claim 3, wherein the blog host passes the fan qualification audit and comprises:
if the vermicelli pays corresponding fees, the vermicelli qualification is approved; or the like, or a combination thereof,
and if the vermicelli meets the auditing conditions customized by the blogger, the vermicelli qualification is approved.
9. The privacy protection method for supporting multi-label and user update in a microblog system according to claim 3, wherein the microblog service platform reestablishes the concern relationship between the bloggers and the fans by using an elliptic curve key exchange algorithm based on the new signature sent by the bloggers comprises:
(a) The blogger generates and saves a new random number x', calculates a new signature c = x -1 x' (mod n) and sending a rekey request message (Bob, c, S) containing the new signature c and the continuation fan S to the microblog service platform, wherein S =<(User 1 ,T 1 ),(User 2 ,T 2 ),…,(User m ,T m )>,User m Denotes the m-th vermicelli, T m Represent and User m A corresponding signature hash value;
(b) After the fans waiting for appointment making are on line, the microblog service platform sends a message requiring appointment making to the fans waiting for appointment making;
(c) The continuous vermicelli generates a new random number r # CalculatingAnd sends the encrypted informationAccessing the microblog service platform;
(d) Encryption information U received by the microblog service platform # ComputingAnd will blind sign informationReturning to the continuous vermicelli;
(e) The renewal fan is based on the received U #′ ComputingAndthe local store (blogger, TAGS, delta) is then updated # ,T # ) And sends the hash value T # And storing the information to the microblog service platform to finish reestablishing the attention relationship between the bloggers and the fans.
CN201711335877.6A 2017-12-14 2017-12-14 Privacy protection method supporting multi-label and user updating in microblog system Active CN108055194B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711335877.6A CN108055194B (en) 2017-12-14 2017-12-14 Privacy protection method supporting multi-label and user updating in microblog system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711335877.6A CN108055194B (en) 2017-12-14 2017-12-14 Privacy protection method supporting multi-label and user updating in microblog system

Publications (2)

Publication Number Publication Date
CN108055194A true CN108055194A (en) 2018-05-18
CN108055194B CN108055194B (en) 2020-10-30

Family

ID=62132250

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711335877.6A Active CN108055194B (en) 2017-12-14 2017-12-14 Privacy protection method supporting multi-label and user updating in microblog system

Country Status (1)

Country Link
CN (1) CN108055194B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020087877A1 (en) * 2018-10-30 2020-05-07 中国科学院信息工程研究所 Privacy information tracing and evidence collection method, apparatus, and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090070884A1 (en) * 2007-09-11 2009-03-12 General Instrument Corporation Method, system and device for secured access to protected digital material
CN107360450A (en) * 2017-08-15 2017-11-17 浙江工商大学 A kind of kindergarten education net cast platform for protecting privacy of user

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090070884A1 (en) * 2007-09-11 2009-03-12 General Instrument Corporation Method, system and device for secured access to protected digital material
CN107360450A (en) * 2017-08-15 2017-11-17 浙江工商大学 A kind of kindergarten education net cast platform for protecting privacy of user

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
赵威: "视频直播平台中的用户隐私保护研究", 《浙江工商大学硕士学位论文》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020087877A1 (en) * 2018-10-30 2020-05-07 中国科学院信息工程研究所 Privacy information tracing and evidence collection method, apparatus, and system

Also Published As

Publication number Publication date
CN108055194B (en) 2020-10-30

Similar Documents

Publication Publication Date Title
Li et al. Efficient and privacy-preserving carpooling using blockchain-assisted vehicular fog computing
US11032086B2 (en) Certificate authority master key tracking on distributed ledger
Yu et al. Enabling attribute revocation for fine-grained access control in blockchain-IoT systems
US10003582B2 (en) Technologies for synchronizing and restoring reference templates
Li et al. A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems
CN110311883A (en) Identity management method, equipment, communication network and storage medium
KR102205654B1 (en) Authentication method in a distributed circumstance
EP3662403B1 (en) Private data processing
CN109729041B (en) Method and device for issuing and acquiring encrypted content
CN107708112A (en) A kind of encryption method suitable for MQTT SN agreements
CN109067528A (en) Crypto-operation, method, cryptographic service platform and the equipment for creating working key
US20180097783A1 (en) Information masking using certificate authority
US20100293099A1 (en) Purchase transaction system with encrypted transaction information
CN101834725A (en) First user is sent to second user&#39;s communications carry out safeguard protection
CN107113286A (en) The roaming content erasing operation of striding equipment
CN104365127B (en) Method for following the trail of mobile device in remote display unit
CN106790037A (en) The instant communication method and system of a kind of User space encryption
CN110557248B (en) Secret key updating method and system based on signcryption of certificateless cryptography
US11677543B2 (en) Key exchange method and key exchange system
CN109347625A (en) Crypto-operation, method, cryptographic service platform and the equipment for creating working key
CN110417547B (en) Secret key updating method and system for secret communication based on certificateless cryptography
Yang et al. Protocol for ownership transfer across authorities: with the ability to assign transfer target
JP2007201522A (en) Encryption communication system, key sharing method, key providing apparatus, and information processing apparatus
CN107959725B (en) Data interaction method considering privacy of both issuing and subscribing parties based on elliptic curve
CN108055194B (en) Privacy protection method supporting multi-label and user updating in microblog system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant