CN111246468A - Data quality perception incentive method aiming at privacy protection in group perception - Google Patents

Data quality perception incentive method aiming at privacy protection in group perception Download PDF

Info

Publication number
CN111246468A
CN111246468A CN202010035651.XA CN202010035651A CN111246468A CN 111246468 A CN111246468 A CN 111246468A CN 202010035651 A CN202010035651 A CN 202010035651A CN 111246468 A CN111246468 A CN 111246468A
Authority
CN
China
Prior art keywords
data
participant
perception
task
service provider
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010035651.XA
Other languages
Chinese (zh)
Other versions
CN111246468B (en
Inventor
蒋云
赵搏文
唐韶华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
South China University of Technology SCUT
Original Assignee
South China University of Technology SCUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by South China University of Technology SCUT filed Critical South China University of Technology SCUT
Priority to CN202010035651.XA priority Critical patent/CN111246468B/en
Publication of CN111246468A publication Critical patent/CN111246468A/en
Application granted granted Critical
Publication of CN111246468B publication Critical patent/CN111246468B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • H04L9/3221Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic

Abstract

The invention discloses a data quality perception incentive method aiming at privacy protection in group perception. The task publisher publishes a collection numerical range, the task participants are recruited by the perception service provider, the participants hide data in the constructed commitment to participate in the evaluation of the perception service provider, meanwhile, the reliability of the data submitted by the task participants is verified by the task publisher, the perception service provider provides anonymous technology for the participants to protect the identity privacy of the participants, and the incentive of data quality under the privacy protection is realized under the constraint of the task budget through the two-stage data quality measurement and the incentive mechanism based on the data quality. The method protects the identity privacy of the user and evaluates the reliability of the data of the participants in a privacy protection manner.

Description

Data quality perception incentive method aiming at privacy protection in group perception
Technical Field
The invention relates to the technical field of information security, in particular to a data quality perception incentive method aiming at privacy protection in group perception.
Background
In recent years, with the popularization of mobile sensor devices and the development of mobile device communication technologies, mobile group awareness is becoming a new data collection paradigm. The population aware application includes three main entities: a task requester, a perceptual service provider, and a group of participants. The task requester outsources the perception task to a perception service provider, and the perception service provider recruits a group of qualified participants to execute the task for the perception task. The group sensing application has the characteristics of easiness in deployment, wide coverage range and low maintenance cost, and brings great convenience for large-scale data collection, but the quality of the collected data is greatly different due to the irregular participation of sensing equipment and the uncontrollable behavior of participants; furthermore, while the perceptual service provider provides convenience for the task to process the collected data, it also faces privacy issues that reveal user data. If the group perception application does not have any privacy protection measures, the willingness of the participants to execute the perception tasks is reduced, and the popularization of the group perception application is influenced.
The reliability of a community-aware application depends not only on the large amount of sensory data collected, but also requires the support of a single high quality data. Existing methods for evaluating perceptual data quality fall into three categories: and (3) a participant reputation score, the context of perception data and a truth value discovery iterative algorithm. Evaluating data quality according to participant reputation scores tends to ignore user data privacy; data quality assessment algorithms such as perceptual data context and truth discovery are vulnerable to malicious data attacks. Therefore, in order to improve the willingness of the participants to execute tasks, reasonably evaluate the quality of the perception data and protect the privacy of the perception data, the incentive method for evaluating the quality of the perception data with privacy protection is realized on the basis of the zero-knowledge proof theory, and meanwhile, anonymous identity information is provided for the participants to protect the identity information of the users.
Disclosure of Invention
The invention aims to overcome the defects and shortcomings of the prior art, and provides a data quality perception excitation method aiming at privacy protection in group perception, which aims at solving the problems of data quality evaluation and data privacy in group perception excitation, proving whether perception data provided by participants are in a reasonable interval range of an evaluation standard, so as to realize the evaluation of data quality, and simultaneously realizing the identity privacy of users through an anonymity technology.
In order to achieve the purpose, the technical scheme provided by the invention is as follows: a data quality perception incentive method aiming at privacy protection in group perception comprises the following steps:
s1, the task publisher initializes the public and private key pair (pk)d,skd) Sending { T, pkdPi, n, B, R are respectively task content T and public key pkdThe incentive reward control parameter pi, the recruiter number n, the budget B and the quality evaluation standard interval R to a perception service provider, and the perception service provider generates a parameter pk of zero knowledge proof for the task Tz(p, G, h), where p is a large prime number, generating a cyclic group G at base p, G and h are generators of the cyclic group G, the perceptual service provider broadcasting task information { T, pkd,pkzN, B recruiting participants wiI is more than or equal to 1 and less than or equal to n, participant wiAccording to cost c of collecting perception dataiAnd minimum reward for the task
Figure BDA0002365892440000021
Determines whether to participate in the task and collects perception data, the perception service provider collecting perception data for each participant wiProviding a token for submitting data
Figure BDA0002365892440000022
Wherein
Figure BDA0002365892440000023
xiIs to perceive the service provider as a participant wiThe random value is selected to be a value,
Figure BDA0002365892440000024
represents a set of positive integers in cyclic group G;
s2, participant wiCalculating an anonymous identity
Figure BDA0002365892440000025
Sending privacy-preserving perceptual data quality assessment requests
Figure BDA0002365892440000026
Wherein y isiIs participant wiSelf-selected random value, zero-knowledge proof of challenge-response protocol iZKM (D) by perceptual service providers with privacy preserving data quality assessmenti,pkzR) determining perception data DiWhether the task is within a reasonable range of the task requirement, namely within a quality evaluation standard interval R;
s3, the perception service provider evaluates the participation data to obtain qualified participant information
Figure BDA0002365892440000031
Is sent to the task publisher, and the task publisher,
Figure BDA0002365892440000032
is participant wiIdentity information of S0,iIs participant wiFor perception data DiStructural commitment, perception of service provider in receiving task publisher's prepaid remuneration
Figure BDA0002365892440000033
Immediately thereafter, the participant is informed to submit the encrypted perception data Enc (D)i,pkd) And a random number Enc (r)i,pkd) To the task publisher, riIs participant wiA random value of choice;
s4, the task publisher encrypts the received encrypted perception data Enc (D)i,pkd) Decrypting and verifying to confirm the perception data DiAfter passing the verification, informing the perception service provider according to
Figure BDA0002365892440000034
Issuing a reward to a participant wi
Figure BDA0002365892440000035
A parameter indicative of a payment confirmation is indicated,pi is an incentive reward control parameter, qiIs to the perception data DiBy Euclidean distance function
Figure BDA0002365892440000036
The value of the metric being evaluated is,
Figure BDA0002365892440000037
is the average of the sum of all the perceptual data,
Figure BDA0002365892440000038
is the average of the sum of all the metrics, otherwise, informs the perception service provider not to send task remuneration to the participant wi
The step S1 includes the steps of:
s11, the task publisher initializes the public and private key pair (pk) of the parameter for the task content Td,skd) Wherein
Figure BDA0002365892440000039
And
Figure BDA00023658924400000310
control incentive reward control parameter pi, number of persons recruiting participants n and budget B, and quality assessment criteria interval R of collected data [ a, B ═]The task publisher sends a task request { T, pkdPi, n, B, R } to a perceptual service provider;
s12, sensing parameters T, pk in service provider broadcast task requestdN, B } and recruiting n participants;
s13 participant w with intention to participateiWhen a request is made to a aware service provider to participate in a task, then the aware service provider computes
Figure BDA00023658924400000311
As a data submission token to participant wi
Figure BDA00023658924400000312
S14, participant wiFirst, the cost of executing the task is judged
Figure BDA00023658924400000313
Whether or not this is true because
Figure BDA00023658924400000314
Is the minimum reward for performing the task, thereby ensuring the benefit of the participant if
Figure BDA00023658924400000315
If true, then participant wiCollecting data D for perceptual tasksi
Step S2 includes the following steps:
s21, participant generates anonymous identity
Figure BDA0002365892440000041
Zero-knowledge proof challenge-response protocol iZKM (D) for privacy preserving data quality assessment participating in zero-knowledge proof constructioni,pkzR), detailed procedures including construction commitments, challenge-response and verification evaluation;
s22, iZKM construction commitment: participant wiSelecting a random value ri,
Figure BDA0002365892440000042
Construct a commitment
Figure BDA0002365892440000043
Is sent to the provider of the awareness service,
Figure BDA0002365892440000044
is that
Figure BDA0002365892440000045
Is determined by the fact that the factors of confusion,
Figure BDA0002365892440000046
is to the perception data DiP, G and h are common parameters, p is a large prime number, G isp prime order cyclic groups, G and h are generator elements of cyclic group G; the reasonable interval is expressed as [ a, b],
Figure BDA0002365892440000047
If the perception data uploaded by the participants
Figure BDA0002365892440000048
The participator and the perception service provider prove that the uploaded perception data are in a reasonable interval through interaction [ a, b ]]Within the range;
s23, iZKM challenge: whenever a aware service provider receives participant wiSent commitment S0,iThe perceptual service provider then returns the value of the lower bound a and the value of the upper bound b of the evaluation range as a challenge to the participant;
s24, iZKM response: after the participants receive the challenge containing the values a and b sent by the perception service provider, the participants judge the perception data D of the participantsiWhether or not in [ a, b ]]Interval, if the perception data D of the participantiIn [ a, b ]]Outside the interval, the participant exits the task and returns ⊥ to the perception service provider, terminating the data quality assessment of the participant if the participant's perception data Di∈[a,b]Then the participant calculates
Figure BDA0002365892440000049
And
Figure BDA00023658924400000410
as a response to the challenge, wherein
Figure BDA00023658924400000411
And
Figure BDA00023658924400000412
are respectively
Figure BDA00023658924400000413
And
Figure BDA00023658924400000414
in the context of the confusion that is,
Figure BDA00023658924400000415
and
Figure BDA00023658924400000416
is to DiA and | b-DiHiding of |, S1,iAnd S2,iResponses to the challenge lower limit a and upper limit b, respectively, and then transmitted (S)1,i,S2,i) To the aware service provider;
s25, iZKM validation evaluation: sensing the response returned by the service provider to the challenge based on the participant (S)1,i,S2,i) Verifying commitments submitted by participants S0,iBy calculating S1,i=S0,i·(ga)-1mod p and S2,i=gb·(S0,i)-1mod p,S0,i、S1,iAnd S2,iAre respectively the participant wiCommitment of constructs and response to challenges, (g)a)-1And gbIs a structural factor, (S)0,i)-1Is S0,iIn the reverse of the loop group G, a computational validation that is true indicates that the participant uses the same perceptual data values in constructing commitments and response challenges, that the perceptual service provider is not spoofed, and that the perceptual service provider trusts the perceptual data D uploaded by the participanti∈[a,b]The perception data uploaded by the participant proves the challenge-response protocol iZKM through zero knowledge of privacy protection data quality evaluation, otherwise the data quality evaluation of the participant is failed.
Step S3 includes the following steps:
s31, participant wiData D ofiThe data quality assessment by the perceptual service provider satisfies the scope of requirements R of the task, and subsequently the perceptual service provider will satisfy the participants w of the data quality assessmentiInformation of
Figure BDA0002365892440000051
Is sent to the task publisher, wherein
Figure BDA0002365892440000052
The representation of an anonymous identity is represented,
Figure BDA0002365892440000053
represents the commitment of the construct while informing the participant wiData D ofiReliability assessment of data quality is satisfied, if not participant w is notifiediThe data evaluation fails, and the task is ended;
s32, the task publisher receives the participant w meeting the data quality evaluationiAfter the information, a prepayment request is sent
Figure BDA0002365892440000054
To a perceptual service provider, wherein
Figure BDA0002365892440000055
Is a prepayment to the participant;
s33, perception service provider receives and provides to participant wiImmediately after the prepayment, the participant w is notifiediSubmitting the perception data to a task publisher;
s34, participant wiEncrypted perception data Enc (D) after receipt of a prepayment noticei,pkd) And a random number Enc (r)i,pkd) And sending the task to the task publisher.
Step S4 includes the following steps:
s41, the task publisher uses the private key skdDecrypting participant submitted data D'i=Dec(Enc(Di,pkd),skd) And r'i=Dec(Enc(ri,pkd),skd);
S42, calculating by task publisher
Figure BDA0002365892440000056
Validating participant wiThe reliability of the submitted data is such that,
Figure BDA0002365892440000057
is that
Figure BDA0002365892440000058
In the context of the confusion that is,
Figure BDA0002365892440000059
is to D obtained after decryptioni'hidden, D'iAnd r'iIs decrypted D'i=Dec(Enc(Di,pkd),skd) And Dec (Enc (r)i,pkd),skd) Result of the acquisition, S0,iIs a commitment made by the participant to perform a privacy data quality assessment,
Figure BDA0002365892440000069
is that the task publisher bases on the participant wiSubmitted data D'i=Dec(Enc(Di,pkd),skd) And r'i=Dec(Enc(ri,pkd),skd) Fabricated commitment as long as task publisher decrypts resulting data D'iAnd r'iSatisfy the requirement of
Figure BDA0002365892440000061
The submitted data meets the reliability, the surplus reward of the participants is paid, and the reward is refused to be paid if the verification is not passed;
s43, sending by the task publisher as long as the data passes the verification
Figure BDA0002365892440000062
To a perception service provider, wherein
Figure BDA0002365892440000063
Representing payment confirmation parameters,. pi.is an incentive reward control parameter,. qiIs to the perception data DiOf the Euclidean distance function
Figure BDA0002365892440000064
The quality of the measurement of (a) is evaluated,
Figure BDA0002365892440000065
is all perceptionThe data is summed with the calculated average value,
Figure BDA0002365892440000066
is the average of the sum of all the metrics, and uses this parameter to inform the sensing service provider whether it is an anonymous user
Figure BDA0002365892440000067
Paying;
s44 perception service provider as participant wiIssuing a true monetary amount
Figure BDA0002365892440000068
m is less than or equal to n, i is less than or equal to 1 and less than or equal to m, m represents the number of users passing the verification of the task publisher, and B is the task budget.
Compared with the prior art, the invention has the following advantages and beneficial effects:
1. the method can effectively balance the reliability evaluation and privacy protection of the data, and the zero-knowledge proof challenge-response protocol iZKM for evaluating the privacy protection data quality can effectively determine whether the data meets the range constraint of a task requester on the data and does not leak the data content.
2. The invention coordinates the relationship between the reward and the data quality, realizes a reward distribution mechanism integrating data quality evaluation and data quality metric evaluation, and realizes reward distribution with data quality consciousness under the constraint of task budget.
3. The invention can effectively prevent some malicious behaviors of participants and task requesters. And the task publisher is prevented from uploading forged data to deceive the task publisher after the task publisher passes data evaluation. Meanwhile, the benefit of the participants is guaranteed through a mechanism of prepaying, and the malicious repudiation behavior of the task publisher is prevented.
Drawings
FIG. 1 is a flow chart of the method of the present invention.
Fig. 2 is a diagram of the architecture of the application of the method of the present invention.
Detailed Description
The present invention will be further described with reference to the following specific examples.
The data quality perception incentive method for privacy protection in group perception provided by the embodiment completes evaluation and incentive of privacy data quality in a semi-trusted perception service provider based on a zero-knowledge proof principle and identity anonymity. In the non-secure channel, submitted data is encrypted through a public key cryptographic algorithm, and the confidentiality of the data is protected. Under the budget constraint, the relation between the data quality and the incentive is effectively coordinated. Malicious behavior of the task publisher and the participant can be effectively prevented by two-level data quantity measurement and reward part incentive.
Firstly, a task publisher initializes a private-public key pair of the task publisher, publishes the content, the public key and the parameters of the task to a service provider, and recruits participants by broadcasting the content of a task request. And the interaction between the perception service provider and the participants is judged through the zero-knowledge proof challenge-response protocol iZKM interaction of privacy protection data quality evaluation, and whether the data participating in evaluation is in a task requirement range is judged.
And secondly, a data submitting part after the data quality evaluation is passed, wherein the perception service provider informs the task publisher of the participant passing the data quality evaluation, and simultaneously constructs an anonymous identity for the participant, the anonymous identity is used for committing the data participating in the evaluation to be sent to the task publisher, the task publisher prepaying part stimulates the reward to the perception service provider, the perception service provider informs the participant to send the encrypted data to the task publisher, and the task publisher decrypts the data and verifies the rationality of the decrypted data through the constructed commitment submitted by the participant.
Finally, the task publisher notifies the aware service provider of the list of participants who pass the data validation, while issuing the remaining portion of incentive rewards through the service provider.
As shown in fig. 1 and fig. 2, the data quality perception incentive method for privacy protection in group perception includes the following steps:
s1, task publisher initializing disclosurePrivate key pair (pk)d,skd) Sending { T, pkdPi, n, B, R are respectively task content T and public key pkdThe incentive reward control parameter pi, the recruiter number n, the budget B and the quality evaluation standard interval R to a perception service provider, and the perception service provider generates a parameter pk of zero knowledge proof for the task Tz(p, G, h), where p is a large prime number, generating a cyclic group G at base p, G and h are generators of the cyclic group G, the perceptual service provider broadcasting task information { T, pkd,pkzN, B recruiting participants wiI is more than or equal to 1 and less than or equal to n, participant wiAccording to cost c of collecting perception dataiAnd minimum reward for the task
Figure BDA0002365892440000081
Determines whether to participate in the task and collects perception data, the perception service provider collecting perception data for each participant wiProviding a token for submitting data
Figure BDA0002365892440000082
Wherein
Figure BDA0002365892440000083
xiIs to perceive the service provider as a participant wiThe random value is selected to be a value,
Figure BDA0002365892440000084
represents a set of positive integers in cyclic group G; the specific process is as follows:
s11, the task publisher initializes the public and private key pair (pk) of the parameter for the task content Td,skd) Wherein
Figure BDA0002365892440000085
And
Figure BDA0002365892440000086
control incentive reward control parameter pi, number of persons recruiting participants n and budget B, and quality assessment criteria interval R of collected data [ a, B ═]The task publisher sends a task request { T, pkdPi, n, B, R to awareness services offeringA donor;
s12, sensing parameters T, pk in service provider broadcast task requestdN, B } and recruiting n participants;
s13 participant w with intention to participateiWhen a request is made to a aware service provider to participate in a task, then the aware service provider computes
Figure BDA0002365892440000087
As a data submission token to participant wi
Figure BDA0002365892440000088
S14, participant wiFirst, the cost of executing the task is judged
Figure BDA0002365892440000089
Whether or not this is true because
Figure BDA00023658924400000810
Is the lowest reward for performing the task, thereby ensuring the benefit of the participant. If it is not
Figure BDA00023658924400000811
If true, then participant wiCollecting data D for perceptual tasksi
S2, participant wiCalculating an anonymous identity
Figure BDA00023658924400000812
Sending privacy-preserving perceptual data quality assessment requests
Figure BDA0002365892440000091
Wherein y isiIs participant wiSelf-selected random value, zero-knowledge proof of challenge-response protocol iZKM (D) by perceptual service providers with privacy preserving data quality assessmenti,pkzR) determining perception data DiWhether the task is within a reasonable range of the task requirement, namely within a quality evaluation standard interval R; the specific process is as follows:
s21, participant generates anonymous identity
Figure BDA0002365892440000092
Zero-knowledge proof challenge-response protocol iZKM (D) for privacy preserving data quality assessment participating in zero-knowledge proof constructioni,pkzR), detailed procedures including construction commitments, challenge-response and verification evaluation;
s22, iZKM construction commitment: participant wiSelecting a random value ri,
Figure BDA0002365892440000093
Construct a commitment
Figure BDA0002365892440000094
Is sent to the provider of the awareness service,
Figure BDA0002365892440000095
is that
Figure BDA0002365892440000096
Is determined by the fact that the factors of confusion,
Figure BDA0002365892440000097
is to the perception data DiP, G and h are public parameters, p is a large prime number, G is a cyclic group of p prime orders, and G and h are generating elements of the cyclic group G; assume a reasonable interval denoted as [ a, b ]],
Figure BDA0002365892440000098
If the perception data uploaded by the participants
Figure BDA0002365892440000099
The participator and the perception service provider prove that the uploaded perception data are in a reasonable interval through interaction [ a, b ]]Within the range;
s23, iZKM challenge: whenever a aware service provider receives participant wiSent commitment S0,iThen the perception service provider will evaluate the scopeThe value of the limit a and the value of the upper limit b are returned to the participant as a challenge;
s24, iZKM response: after the participants receive the challenge containing the values a and b sent by the perception service provider, the participants judge the perception data D of the participantsiWhether or not in [ a, b ]]Interval, if the perception data D of the participantiIn [ a, b ]]Outside the interval, the participant exits the task and returns ⊥ to the perception service provider, terminating the data quality assessment of the participant if the participant's perception data Di∈[a,b]Then the participant calculates
Figure BDA00023658924400000910
And
Figure BDA00023658924400000911
as a response to the challenge, wherein
Figure BDA00023658924400000912
And
Figure BDA00023658924400000913
are respectively
Figure BDA00023658924400000914
And
Figure BDA00023658924400000915
in the context of the confusion that is,
Figure BDA00023658924400000916
and
Figure BDA00023658924400000917
is to DiA and | b-DiHiding of |, S1,iAnd S2,iResponses to the challenge lower limit a and upper limit b, respectively, and then transmitted (S)1,i,S2,i) To the aware service provider;
s25, iZKM validation evaluation: sensing the response returned by the service provider to the challenge based on the participant (S)1,i,S2,i) Verifying commitments submitted by participants S0,iBy calculating S1,i=S0,i·(ga)-1mod p and S2,i=gb·(S0,i)-1mod p,S0,i、S1,iAnd S2,iAre respectively the participant wiCommitment of constructs and response to challenges, (g)a)-1And gbIs a structural factor, (S)0,i)-1Is S0,iIn the reverse of the loop group G, a computational validation that is true indicates that the participant uses the same perceptual data values in constructing commitments and response challenges, that the perceptual service provider is not spoofed, and that the perceptual service provider trusts the perceptual data D uploaded by the participanti∈[a,b]The perception data uploaded by the participant proves the challenge-response protocol iZKM through zero knowledge of privacy protection data quality evaluation, otherwise the data quality evaluation of the participant is failed.
S3, the perception service provider evaluates the participation data to obtain qualified participant information
Figure BDA0002365892440000101
Is sent to the task publisher, and the task publisher,
Figure BDA0002365892440000102
is participant wiIdentity information of S0,iIs participant wiFor perception data DiStructural commitment, perception of service provider in receiving task publisher's prepaid remuneration
Figure BDA0002365892440000103
Immediately thereafter, the participant is informed to submit the encrypted perception data Enc (D)i,pkd) And a random number Enc (r)i,pkd) To the task publisher, riIs participant wiA random value of choice; the specific process is as follows:
s31, participant wiData D ofiThe data quality assessment by the perceptual service provider satisfies the scope of requirements R of the task, and subsequently the perceptual service provider will satisfy the participants w of the data quality assessmentiInformation of
Figure BDA0002365892440000104
Is sent to the task publisher, wherein
Figure BDA0002365892440000105
The representation of an anonymous identity is represented,
Figure BDA0002365892440000106
represents the commitment of the construct while informing the participant wiData D ofiReliability assessment of data quality is satisfied, if not participant w is notifiediThe data evaluation fails, and the task is ended;
s32, the task publisher receives the participant w meeting the data quality evaluationiAfter the information, a prepayment request is sent
Figure BDA0002365892440000107
To a perceptual service provider, wherein
Figure BDA0002365892440000108
Is a prepayment to the participant;
s33, perception service provider receives and provides to participant wiImmediately after the prepayment, the participant w is notifiediSubmitting the perception data to a task publisher;
s34, participant wiEncrypted perception data Enc (D) after receipt of a prepayment noticei,pkd) And a random number Enc (r)i,pkd) And sending the task to the task publisher.
S4, the task publisher encrypts the received encrypted perception data Enc (D)i,pkd) Decrypting and verifying to confirm the perception data DiAfter passing the verification, informing the perception service provider according to
Figure BDA0002365892440000111
Issuing a reward to a participant wi
Figure BDA0002365892440000112
Representing payment confirmation parameters,. pi.is an incentive reward control parameter,. qiIs to the perception data DiBy Euclidean distance function
Figure BDA0002365892440000113
The value of the metric being evaluated is,
Figure BDA0002365892440000114
is the average of the sum of all the perceptual data,
Figure BDA0002365892440000115
is the average of the sum of all the metrics, otherwise, informs the perception service provider not to send task remuneration to the participant wi(ii) a The specific process is as follows:
s41, the task publisher uses the private key skdDecrypting participant submitted data D'i=Dec(Enc(Di,pkd),skd) And r'i=Dec(Enc(ri,pkd),skd);
S42, calculating by task publisher
Figure BDA0002365892440000116
Validating participant wiThe reliability of the submitted data is such that,
Figure BDA0002365892440000117
is that
Figure BDA0002365892440000118
In the context of the confusion that is,
Figure BDA0002365892440000119
is to D 'obtained after decryption'iIs hidden, D'iAnd r'iIs decrypted D'i=Dec(Enc(Di,pkd),skd) And Dec (Enc (r)i,pkd),skd) Result of the acquisition, S0,iIs a commitment made by the participant to perform a privacy data quality assessment,
Figure BDA00023658924400001110
is that the task publisher bases on the participant wiSubmitted data Di'=Dec(Enc(Di,pkd),skd) And r'i=Dec(Enc(ri,pkd),skd) Fabricated commitment as long as task publisher decrypts resulting data D'iAnd r'iSatisfy the requirement of
Figure BDA00023658924400001111
The submitted data meets the reliability, the surplus reward of the participants is paid, and the reward is refused to be paid if the verification is not passed;
s43, sending by the task publisher as long as the data passes the verification
Figure BDA00023658924400001112
To a perception service provider, wherein
Figure BDA00023658924400001113
Representing payment confirmation parameters,. pi.is an incentive reward control parameter,. qiIs to the perception data DiOf the Euclidean distance function
Figure BDA00023658924400001114
The quality of the measurement of (a) is evaluated,
Figure BDA00023658924400001115
is the average of the sum of all the perceptual data,
Figure BDA00023658924400001116
is the average of the sum of all the metrics, and uses this parameter to inform the sensing service provider whether it is an anonymous user
Figure BDA00023658924400001117
Paying;
s44 perception service provider as participant wiIssuing a true monetary amount
Figure BDA00023658924400001118
m is less than or equal to n, i is less than or equal to 1 and less than or equal to m, m represents the number of users passing the verification of the task publisher, and B is the task budget.
The task publisher: the system is used for initializing the public and private keys of the system, determining a reasonable interval of data, determining the number of people for recruiting participants and determining the reward for releasing tasks; issuing a prepaid fee to the participant for data quality assessment by the service provider; decrypting the encrypted data submitted by the participant and verifying the encrypted data according to a zero-knowledge proof principle; compensation is issued by the service provider to the participants who provide data that meets the task requirements.
The perception service provider: the method is used for data quality evaluation, and according to the commitment constructed by the sensing data used by the participants, the upper limit and the lower limit of a reasonable interval required by a sending task are used as a challenge to be sent to the participants; judging whether the data meets the requirements of the task or not according to the response of the participants to the challenge; the commitment and the anonymous identity of the participant passing the data quality evaluation are sent to a task publisher, the participant is informed of passing the data quality evaluation, and if the participant does not pass the data quality evaluation, the participant is informed of ending; and after the task publisher verifies the data, issuing incentive compensation to the participants.
The participants: the system comprises a data acquisition module, a data processing module and a data processing module, wherein the data acquisition module is used for acquiring data for a perception task, constructing a commitment containing perception data according to task parameters broadcast by a service provider and submitting the commitment to the service provider for evaluation; simultaneously responding to challenges posed by the service provider with respect to the data commitments; and after the data quality evaluation is carried out, encrypting the sensing data by using the public key of the task publisher and sending the encrypted sensing data to the task publisher.
In summary, the present invention mainly includes privacy protection data quality assessment, participant identity privacy protection, two-level data quality metrics, and a data quality-based incentive function. In the initialization process, a task publisher initializes a public key and a private key, and gives a reasonable range of collected data, the number of recruited people and task incentive rewards; the service provider broadcasts task information and recruits participants, simultaneously performs quality evaluation on data of the participants, sets anonymous identities for users who pass the data quality evaluation, and forwards data commitments and the anonymous identities of the participants to a task publisher; the task publisher issues prepaid consideration to the participant who passes the data quality evaluation to the service provider, and the service provider informs the participant to submit the encrypted data to the task publisher; the task publisher decrypts the encrypted data and performs calculation verification with the data commitment of the user; the task publisher issues the remaining incentive rewards to the service provider for the verified participants; finally the service provider sends all the rewards this time to the participants.
The above embodiments are preferred embodiments of the present invention, but the present invention is not limited to the above embodiments, and any other changes, modifications, substitutions, combinations, and simplifications which do not depart from the spirit and principle of the present invention should be construed as equivalents thereof, and all such changes, modifications, substitutions, combinations, and simplifications are intended to be included in the scope of the present invention.

Claims (5)

1. A data quality perception incentive method aiming at privacy protection in group perception is characterized by comprising the following steps:
s1, the task publisher initializes the public and private key pair (pk)d,skd) Sending { T, pkdPi, n, B, R are respectively task content T and public key pkdThe incentive reward control parameter pi, the recruiter number n, the budget B and the quality evaluation standard interval R to a perception service provider, and the perception service provider generates a parameter pk of zero knowledge proof for the task Tz(p, G, h), where p is a large prime number, generating a cyclic group G at base p, G and h are generators of the cyclic group G, the perceptual service provider broadcasting task information { T, pkd,pkzN, B recruiting participants wiI is more than or equal to 1 and less than or equal to n, participant wiAccording to cost c of collecting perception dataiAnd minimum reward for the task
Figure FDA0002365892430000011
Determines whether to participate in the task and collects perception data, the perception service provider collecting perception data for each participant wiProviding a token for submitting data
Figure FDA0002365892430000012
Wherein
Figure FDA0002365892430000013
xiIs to perceive the service provider as a participant wiThe random value is selected to be a value,
Figure FDA0002365892430000014
represents a set of positive integers in cyclic group G;
s2, participant wiCalculating an anonymous identity
Figure FDA0002365892430000015
Sending privacy-preserving perceptual data quality assessment requests
Figure FDA0002365892430000016
Wherein y isiIs participant wiSelf-selected random value, zero-knowledge proof of challenge-response protocol iZKM (D) by perceptual service providers with privacy preserving data quality assessmenti,pkzR) determining perception data DiWhether the task is within a reasonable range of the task requirement, namely within a quality evaluation standard interval R;
s3, the perception service provider evaluates the participation data to obtain qualified participant information
Figure FDA0002365892430000017
Is sent to the task publisher, and the task publisher,
Figure FDA0002365892430000018
is participant wiIdentity information of S0,iIs participant wiFor perception data DiStructural commitment, perception of service provider in receiving task publisher's prepaid remuneration
Figure FDA0002365892430000019
Immediately thereafter, the participant is informed to submit the encrypted perception data Enc (D)i,pkd) And random numberEnc(ri,pkd) To the task publisher, riIs participant wiA random value of choice;
s4, the task publisher encrypts the received encrypted perception data Enc (D)i,pkd) Decrypting and verifying to confirm the perception data DiAfter passing the verification, informing the perception service provider according to
Figure FDA00023658924300000110
Issuing a reward to a participant wi
Figure FDA0002365892430000021
Representing payment confirmation parameters,. pi.is an incentive reward control parameter,. qiIs to the perception data DiBy Euclidean distance function
Figure FDA0002365892430000022
The value of the metric being evaluated is,
Figure FDA0002365892430000023
is the average of the sum of all the perceptual data,
Figure FDA0002365892430000024
is the average of the sum of all the metrics, otherwise, informs the perception service provider not to send task remuneration to the participant wi
2. The data quality perception incentive method for privacy protection in community perception according to claim 1, wherein the step S1 comprises the following steps:
s11, the task publisher initializes the public and private key pair (pk) of the parameter for the task content Td,skd) Wherein
Figure FDA0002365892430000025
And
Figure FDA0002365892430000026
control incentive reward control parameter pi, number of persons recruiting participants n and budget B, and quality assessment criteria interval R of collected data [ a, B ═]The task publisher sends a task request { T, pkdPi, n, B, R } to a perceptual service provider;
s12, sensing parameters T, pk in service provider broadcast task requestdN, B } and recruiting n participants;
s13 participant w with intention to participateiWhen a request is made to a aware service provider to participate in a task, then the aware service provider computes
Figure FDA0002365892430000027
As a data submission token to participant wi
Figure FDA0002365892430000028
S14, participant wiFirst, the cost of executing the task is judged
Figure FDA0002365892430000029
Whether or not this is true because
Figure FDA00023658924300000210
Is the minimum reward for performing the task, thereby ensuring the benefit of the participant if
Figure FDA00023658924300000211
If true, then participant wiCollecting data D for perceptual tasksi
3. The data quality perception incentive method for privacy protection in community perception according to claim 1, wherein the step S2 comprises the following steps:
s21, participant generates anonymous identity
Figure FDA00023658924300000212
Zero-knowledge proof challenge-response protocol iZKM (D) for privacy preserving data quality assessment participating in zero-knowledge proof constructioni,pkzR), detailed procedures including construction commitments, challenge-response and verification evaluation;
s22, iZKM construction commitment: participant wiSelecting a random value ri,
Figure FDA0002365892430000031
Construct a commitment
Figure FDA0002365892430000032
Is sent to the provider of the awareness service,
Figure FDA0002365892430000033
is that
Figure FDA0002365892430000034
Is determined by the fact that the factors of confusion,
Figure FDA0002365892430000035
is to the perception data DiP, G and h are public parameters, p is a large prime number, G is a cyclic group of p prime orders, and G and h are generating elements of the cyclic group G; the reasonable interval is expressed as [ a, b],
Figure FDA0002365892430000036
If the perception data uploaded by the participants
Figure FDA0002365892430000037
The participator and the perception service provider prove that the uploaded perception data are in a reasonable interval through interaction [ a, b ]]Within the range;
s23, iZKM challenge: whenever a aware service provider receives participant wiSent commitment S0,iThe perceptual service provider then returns the value of the lower bound a and the value of the upper bound b of the evaluation range as a challenge to the participant;
s24, iZKM response: after the participants receive the challenge containing the values a and b sent by the perception service provider, the participants judge the perception data D of the participantsiWhether or not in [ a, b ]]Interval, if the perception data D of the participantiIn [ a, b ]]Outside the interval, the participant exits the task and returns ⊥ to the perception service provider, terminating the data quality assessment of the participant if the participant's perception data Di∈[a,b]Then the participant calculates
Figure FDA0002365892430000038
And
Figure FDA0002365892430000039
as a response to the challenge, wherein
Figure FDA00023658924300000310
And
Figure FDA00023658924300000311
are respectively
Figure FDA00023658924300000312
And
Figure FDA00023658924300000313
in the context of the confusion that is,
Figure FDA00023658924300000314
and
Figure FDA00023658924300000315
is to DiA and | b-DiHiding of |, S1,iAnd S2,iResponses to the challenge lower limit a and upper limit b, respectively, and then transmitted (S)1,i,S2,i) To the aware service provider;
s25, iZKM validation evaluation: sensing the response returned by the service provider to the challenge based on the participant (S)1,i,S2,i) Verifying participant submissionsCommitment S0,iBy calculating S1,i=S0,i·(ga)-1mod p and S2,i=gb·(S0,i)-1mod p,S0,i、S1,iAnd S2,iAre respectively the participant wiCommitment of constructs and response to challenges, (g)a)-1And gbIs a structural factor, (S)0,i)-1Is S0,iIn the reverse of the loop group G, a computational validation that is true indicates that the participant uses the same perceptual data values in constructing commitments and response challenges, that the perceptual service provider is not spoofed, and that the perceptual service provider trusts the perceptual data D uploaded by the participanti∈[a,b]The perception data uploaded by the participant proves the challenge-response protocol iZKM through zero knowledge of privacy protection data quality evaluation, otherwise the data quality evaluation of the participant is failed.
4. The data quality perception incentive method for privacy protection in community perception according to claim 1, wherein the step S3 comprises the following steps:
s31, participant wiData D ofiThe data quality assessment by the perceptual service provider satisfies the scope of requirements R of the task, and subsequently the perceptual service provider will satisfy the participants w of the data quality assessmentiInformation of
Figure FDA0002365892430000041
Is sent to the task publisher, wherein
Figure FDA0002365892430000042
The representation of an anonymous identity is represented,
Figure FDA0002365892430000043
represents the commitment of the construct while informing the participant wiData D ofiReliability assessment of data quality is satisfied, if not participant w is notifiediThe data evaluation fails, and the task is ended;
s32, the task publisher receives the participant w meeting the data quality evaluationiAfter the information, a prepayment request is sent
Figure FDA0002365892430000044
To a perceptual service provider, wherein
Figure FDA0002365892430000045
Is a prepayment to the participant;
s33, perception service provider receives and provides to participant wiImmediately after the prepayment, the participant w is notifiediSubmitting the perception data to a task publisher;
s34, participant wiEncrypted perception data Enc (D) after receipt of a prepayment noticei,pkd) And a random number Enc (r)i,pkd) And sending the task to the task publisher.
5. The data quality perception incentive method for privacy protection in community perception according to claim 1, wherein the step S4 comprises the following steps:
s41, the task publisher uses the private key skdDecrypting participant submitted data Di'=Dec(Enc(Di,pkd),skd) And ri'=Dec(Enc(ri,pkd),skd);
S42, calculating by task publisher
Figure FDA0002365892430000046
Validating participant wiThe reliability of the submitted data is such that,
Figure FDA0002365892430000047
is that
Figure FDA0002365892430000048
In the context of the confusion that is,
Figure FDA0002365892430000049
is to D 'obtained after decryption'iIs hidden, D'iAnd r'iIs decrypted D'i=Dec(Enc(Di,pkd),skd) And Dec (Enc (r)i,pkd),skd) Result of the acquisition, S0,iIs a commitment made by the participant to perform a privacy data quality assessment,
Figure FDA00023658924300000410
is that the task publisher bases on the participant wiSubmitted data D'i=Dec(Enc(Di,pkd),skd) And r'i=Dec(Enc(ri,pkd),skd) Fabricated commitment as long as task publisher decrypts resulting data D'iAnd r'iSatisfy the requirement of
Figure FDA0002365892430000051
The submitted data meets the reliability, the surplus reward of the participants is paid, and the reward is refused to be paid if the verification is not passed;
s43, sending by the task publisher as long as the data passes the verification
Figure FDA0002365892430000052
To a perception service provider, wherein
Figure FDA0002365892430000053
Representing payment confirmation parameters,. pi.is an incentive reward control parameter,. qiIs to the perception data DiOf the Euclidean distance function
Figure FDA0002365892430000054
The quality of the measurement of (a) is evaluated,
Figure FDA0002365892430000055
is the average of the sum of all the perceptual data,
Figure FDA0002365892430000056
is the average of the sum of all the metrics, and uses this parameter to inform the sensing service provider whether it is an anonymous user
Figure FDA0002365892430000057
Paying;
s44 perception service provider as participant wiIssuing a true monetary amount
Figure FDA0002365892430000058
m is less than or equal to n, i is less than or equal to 1 and less than or equal to m, m represents the number of users passing the verification of the task publisher, and B is the task budget.
CN202010035651.XA 2020-01-14 2020-01-14 Data quality perception incentive method aiming at privacy protection in group perception Active CN111246468B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010035651.XA CN111246468B (en) 2020-01-14 2020-01-14 Data quality perception incentive method aiming at privacy protection in group perception

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010035651.XA CN111246468B (en) 2020-01-14 2020-01-14 Data quality perception incentive method aiming at privacy protection in group perception

Publications (2)

Publication Number Publication Date
CN111246468A true CN111246468A (en) 2020-06-05
CN111246468B CN111246468B (en) 2021-03-30

Family

ID=70880802

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010035651.XA Active CN111246468B (en) 2020-01-14 2020-01-14 Data quality perception incentive method aiming at privacy protection in group perception

Country Status (1)

Country Link
CN (1) CN111246468B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113034223A (en) * 2021-03-10 2021-06-25 中国人民大学 Crowd sourcing service transaction matching method, system and medium based on incentive mechanism
CN113079486A (en) * 2021-04-08 2021-07-06 青岛科技大学 Vehicle networking crowd sensing and incentive method with privacy protection characteristic based on block chain
CN113139204A (en) * 2021-01-27 2021-07-20 东南数字经济发展研究院 Medical data privacy protection method using zero-knowledge proof and shuffling algorithm
CN114760067A (en) * 2022-03-30 2022-07-15 西安电子科技大学 Block chain group intelligent perception system privacy security protection method using zero knowledge certification
CN116506845A (en) * 2023-06-19 2023-07-28 暨南大学 Privacy-protected Internet of vehicles crowd sensing excitation method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9818136B1 (en) * 2003-02-05 2017-11-14 Steven M. Hoffberg System and method for determining contingent relevance
CN108023648A (en) * 2017-11-02 2018-05-11 南京邮电大学 A kind of cooperative frequency spectrum sensing method based on multitask intelligent perception
CN110602077A (en) * 2019-09-03 2019-12-20 成都信息工程大学 Quantum block chain network anonymous election method and system based on trust evaluation

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9818136B1 (en) * 2003-02-05 2017-11-14 Steven M. Hoffberg System and method for determining contingent relevance
CN108023648A (en) * 2017-11-02 2018-05-11 南京邮电大学 A kind of cooperative frequency spectrum sensing method based on multitask intelligent perception
CN110602077A (en) * 2019-09-03 2019-12-20 成都信息工程大学 Quantum block chain network anonymous election method and system based on trust evaluation

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
孙丝雨: "面向车辆群体感知场景的隐私保护技术研究", 《CNKI中国硕士学位论文全文数据库信息科技辑》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113139204A (en) * 2021-01-27 2021-07-20 东南数字经济发展研究院 Medical data privacy protection method using zero-knowledge proof and shuffling algorithm
CN113139204B (en) * 2021-01-27 2022-09-30 东南数字经济发展研究院 Medical data privacy protection method using zero-knowledge proof and shuffling algorithm
CN113034223A (en) * 2021-03-10 2021-06-25 中国人民大学 Crowd sourcing service transaction matching method, system and medium based on incentive mechanism
CN113034223B (en) * 2021-03-10 2024-03-05 中国人民大学 Crowd-sourced service transaction matching method, system and medium based on incentive mechanism
CN113079486A (en) * 2021-04-08 2021-07-06 青岛科技大学 Vehicle networking crowd sensing and incentive method with privacy protection characteristic based on block chain
CN113079486B (en) * 2021-04-08 2022-05-27 青岛科技大学 Vehicle networking crowd sensing and incentive method with privacy protection characteristic based on block chain
CN114760067A (en) * 2022-03-30 2022-07-15 西安电子科技大学 Block chain group intelligent perception system privacy security protection method using zero knowledge certification
CN114760067B (en) * 2022-03-30 2023-09-12 西安电子科技大学 Privacy security protection method for blockchain crowd sensing system by using zero knowledge proof
CN116506845A (en) * 2023-06-19 2023-07-28 暨南大学 Privacy-protected Internet of vehicles crowd sensing excitation method and system
CN116506845B (en) * 2023-06-19 2023-09-15 暨南大学 Privacy-protected Internet of vehicles crowd sensing excitation method and system

Also Published As

Publication number Publication date
CN111246468B (en) 2021-03-30

Similar Documents

Publication Publication Date Title
CN111246468B (en) Data quality perception incentive method aiming at privacy protection in group perception
Xiong et al. A personalized privacy protection framework for mobile crowdsensing in IIoT
Gabay et al. Privacy-preserving authentication scheme for connected electric vehicles using blockchain and zero knowledge proofs
CN107749836B (en) Mobile sensing system and mobile sensing method for user privacy protection and data reliability
Zhu et al. Privacy-preserving authentication and data aggregation for fog-based smart grid
CN107483211B (en) Individualized k-anonymous privacy protection and excitation method based on block chain
CN107528835B (en) User privacy protection method based on security intelligent contract k-anonymous incentive mechanism
JP5274096B2 (en) Non-repudiation for digital content distribution
US20100229241A1 (en) Method of accessing service, device and system thereof
CN113595738B (en) Block chain-based collaborative position privacy protection method
CN110825810B (en) Block chain-based crowd sensing dual privacy protection method
CN105245345A (en) High reliability perception data collection algorithm based on mobile perception user anonymity reputation in crowd sensing
Wang et al. Towards privacy-driven truthful incentives for mobile crowdsensing under untrusted platform
CN109919619A (en) Privacy of identities guard method in a kind of transaction of block chain
CN111556041B (en) Block chain-based participatory sensing system with privacy protection and method thereof
Petrlic et al. Privacy-preserving reputation management
CN115801260B (en) Block chain-assisted collaborative attack and defense game method in untrusted network environment
CN114565386A (en) Block chain escrow transaction method and system with multi-party cooperative privacy protection
CN110502905B (en) Privacy-protecting distributed account book transaction method and system
WO2021222669A1 (en) Decentralized privacy-preserving rewards with cryptographic black box accumulators
Ismail et al. A security architecture for reputation systems
Mengjun et al. Privacy-preserving distributed location proof generating system
CN110365671B (en) Crowd sensing incentive mechanism method supporting privacy protection
Hasan A Survey of privacy preserving reputation systems
JP4971917B2 (en) Signature generation device, signature verification device, group management device, and program thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant