CN113507452B - Vehicle networking privacy protection data sharing system based on block chain - Google Patents

Vehicle networking privacy protection data sharing system based on block chain Download PDF

Info

Publication number
CN113507452B
CN113507452B CN202110679847.7A CN202110679847A CN113507452B CN 113507452 B CN113507452 B CN 113507452B CN 202110679847 A CN202110679847 A CN 202110679847A CN 113507452 B CN113507452 B CN 113507452B
Authority
CN
China
Prior art keywords
data
service provider
sharing service
vehicle
provider
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110679847.7A
Other languages
Chinese (zh)
Other versions
CN113507452A (en
Inventor
王超
成晓蔓
王硕
何云华
肖珂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
North China University of Technology
Original Assignee
North China University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by North China University of Technology filed Critical North China University of Technology
Priority to CN202110679847.7A priority Critical patent/CN113507452B/en
Publication of CN113507452A publication Critical patent/CN113507452A/en
Application granted granted Critical
Publication of CN113507452B publication Critical patent/CN113507452B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • H04L9/3221Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a block chain-based vehicle networking privacy protection data sharing system, which comprises a certificate management mechanism, a data sharing service provider, a vehicle and roadside units, wherein the certificate management mechanism is used for managing the data sharing service provider; each vehicle in the internet of vehicles can communicate with roadside units and other vehicles to realize information sharing; the vehicle is divided into a data requester and a data provider, the data requester requests data from other vehicles in the Internet of vehicles by sending data requests, and the data provider senses and collects the data and then provides the data to the data requester; the certificate management mechanism is used for vehicle registration, certificate issuance, certificate revocation and vehicle behavior monitoring; the data sharing service provider is the core of the system and is used for issuing data request announcements, forwarding the collected data to the data requester and assisting the data requester in rewarding the data provider. The invention can realize that the vehicle shares the perception data and earns the reward at the same time, and can not reveal the privacy.

Description

Vehicle networking privacy protection data sharing system based on block chain
Technical Field
The invention relates to the technical field of blockchain technology and zero-knowledge proof technology, in particular to a block-chain-based vehicle networking privacy protection data sharing system.
Background
Vehicles in the internet of vehicles may communicate with different entities, including vehicles, roadside units, personal devices, and the like. With the continuous expansion of communication technology and scale, massive sensing data in the internet of vehicles are collected and become important resources. The collection of the vehicle data can not only improve the driving safety, but also enable the user to obtain more intelligent service. However, vehicles in the network are often reluctant to share the collected sensory data for two main reasons. First, the sensing process will consume a large amount of resources, such as its own storage and communication resources. If the vehicles do not receive any rewards, they are reluctant to participate in the data perception process. It is therefore a challenging problem how to design a mechanism that encourages the vehicle to participate in this process. Second, the sensory data contains the privacy of the vehicle, such as location information and identity information. Each vehicle is concerned about exposing its own privacy to the outside world. Thus, protecting vehicle privacy during sharing is another problem that needs to be addressed.
In order to solve the problem that vehicles in the internet of vehicles are unwilling to share data, research students in various circles successively put forward some solutions. Most solutions are centralized and once the centralized server is attacked, it faces the security challenge that the vehicle does not trust the internet of vehicles. Therefore, a distributed method, a blockchain technique, originated from a point-to-point bitcoin system has been applied to many studies. However, in vehicle communication, the availability of information and privacy protection are conflicting, and transactions on the blockchain can be accessed by all nodes in the network, which may result in exposing vehicle identity and data information and not well protecting privacy. The invention provides a block chain-based vehicle networking privacy protection data sharing system by utilizing a non-interactive zero-knowledge proof, aiming at the privacy protection problem in a vehicle networking distributed data sharing scheme.
Disclosure of Invention
In order to solve the problem that data availability and user privacy protection cannot be considered in the existing car networking data sharing process, the invention provides a block chain-based car networking privacy protection data sharing system, so that a vehicle can earn rewards while sharing sensed data, and privacy cannot be revealed.
To solve the above technical problem, an embodiment of the present invention provides the following solutions:
a block chain-based vehicle networking privacy protection data sharing system comprises a certificate management mechanism, a data sharing service provider, a vehicle and roadside units;
each vehicle in the internet of vehicles can communicate with the roadside unit and other vehicles to realize information sharing; the vehicles are divided into data requesters and data providers, the data requesters request data from other vehicles in the Internet of vehicles by sending data requests, and the data providers sense and collect the data and then provide the data to the data requesters;
the certificate authority is used for vehicle registration, certificate issuance, certificate revocation and vehicle behavior monitoring; the data sharing service provider is the core of the system and is used for issuing data request announcements, forwarding the collected data to the data requester and assisting the data requester in rewarding the data provider.
Preferably, the certificate authority is specifically configured to:
when the vehicle is registered in the system, generating a vehicle certificate and recording the identity of the vehicle in a database;
distributing the generated certificate to registered vehicles;
and managing the certificates of all vehicles in the Internet of vehicles, and if the vehicles violate the rules, revoking the certificates of the vehicles.
Preferably, the data sharing service provider is specifically configured to:
forming a data request notice according to the request of the data requester, and issuing the data request notice in the Internet of vehicles;
the data collected by the data providers is forwarded to the corresponding data requesters and assists the data requesters in paying rewards to the data providers that provide the qualified data.
Preferably, the block chain structure of the system comprises two parts, namely an evaluation chain and a transaction chain;
the evaluation chain is used for storing evaluation information of data provided by a data provider, and the evaluation information is issued by a data requester;
the transaction chain is used for storing transaction information.
Preferably, the operation of the system comprises three parts, namely an initialization stage, a data providing stage and a prize drawing stage;
in the initialization phase:
the vehicle and the data sharing service provider send the required data to a certificate authority for registration;
the certificate authority publishes communication parameters, generates an anonymous certificate for the vehicle, and generates a key pair for a data sharing service provider;
in the data providing stage:
the data requester sends a data request and a corresponding reward to the data sharing service provider;
the data sharing service provider constructs and issues a data request notice;
the data provider collects the data and sends the data encrypted in advance to the data sharing service provider by using the pseudonym identity;
the data sharing service provider checks the validity of the received data with an anonymous certificate, and the valid data is forwarded to the data requester without exposing owner information, wherein the owner information comprises a pseudonym identity;
the data requester evaluates the received data and records evaluation information in an evaluation chain;
in the stage of prize winning:
the data sharing service provider generates public parameters for qualified data providers to obtain rewards;
each data provider checks whether its shared data can receive a reward; if so, the qualified data provider uses its pseudonym identity to receive a reward from the data sharing service provider; the data sharing service provider then sends an anonymous voucher to the data provider eligible for the reward;
the data provider rewards its real account by using anonymous voucher and reward token;
after the data sharing service provider sends the reward to the qualified data provider, the transaction information is recorded in the transaction chain.
Preferably, the initialization phase comprises vehicle and data sharing service provider registration, and anonymous certificate generation;
vehicle and data sharing service provider registration includes: any vehicle intending to participate in data sharing must register with the certificate authority to obtain a legal identity, and in the registration process, the vehicle submits required information to the certificate authority, and the registered vehicle is identified as a legal vehicle; likewise, the data sharing service provider also needs to register in the certificate authority to obtain a legitimate identity;
anonymous certificate generation includes:
vehicle anonymous certificate generation:
a. the certificate authority generates three multiplicative cyclic groups G of the same order q 1 ,G 2 ,G T Wherein q is a large prime number, g 1 ,g 2 Are each G 1 ,G 2 And e (,) represents a bilinear map, e: g 1 ×G 2 →G T (ii) a Certificate authority selects two random numbers
Figure BDA0003122067920000031
As a master key, and calculates
Figure BDA0003122067920000032
And
Figure BDA0003122067920000033
certificate authorities also select secure cryptographic hash functions
Figure BDA0003122067920000034
Certificate authority selecting random number
Figure BDA0003122067920000035
And calculate
Figure BDA0003122067920000036
As a daily authentication key, the vehicle requests the corresponding β from the timestamp, and then issues the tuple { q, e, g } 1 ,g 2 ,G 1 ,G 2 ,G T ,P 1 ,P 2 H, β } as a common communication parameter;
b. if the vehicle registration is successful, the certificate authority begins to distribute the key for the vehicle; certificate authority as vehicle v i Creating a real identity
Figure BDA0003122067920000041
And a false identity
Figure BDA0003122067920000042
Figure BDA0003122067920000043
In addition, the certificate authority selects a random number
Figure BDA0003122067920000044
And calculate
Figure BDA0003122067920000045
Finally, the certificate authority stores it locally
Figure BDA0003122067920000046
And authorizes the key
Figure BDA0003122067920000047
Wherein
Figure BDA0003122067920000048
Figure BDA0003122067920000049
c. When the vehicle intends to participate in data sharing, generating an anonymous certificate using the AK; randomly selecting some data for each vehicle
Figure BDA00031220679200000410
N is less than or equal to l and is used as a short-time private key, and a corresponding short-time public key is calculated
Figure BDA00031220679200000411
Wherein k =1,2, ·, l; then, the vehicle selects a random number
Figure BDA00031220679200000412
And calculate
Figure BDA00031220679200000413
Figure BDA00031220679200000414
Figure BDA00031220679200000415
Figure BDA00031220679200000416
In calculating
Figure BDA00031220679200000417
After the value of (d), the vehicle calculates the verification parameters c and δ 1 ,δ 2
Figure BDA00031220679200000418
δ 1 =(r k -c 1 )mod q,δ 2 =(r k -c 2 )mod q.
d. Finally, the anonymous certificate is represented as:
Figure BDA00031220679200000419
data sharing service provider anonymous certificate generation:
certificate authority generated random numbers
Figure BDA00031220679200000420
And calculate
Figure BDA00031220679200000421
The certificate authority then sends a key pair (r) d ,Y d ) To the data sharing service provider, where r d Is a private key, Y d Is a public key.
Preferably, the data submitting stage comprises vehicle request data, issuing request notice, data sensing uploading, data verification forwarding and data evaluation;
the vehicle request data includes: if the vehicle needs data, firstly, sending the data request and the corresponding reward to a data sharing service provider; at the end of data sharing, the data sharing service provider evenly distributes rewards to the data providers; in addition, the data requester sends its public key to the certificate authority, and the data provider encrypts the sensing data using the public key;
the issuing of the request announcement includes: after receiving the reward, the data sharing service provider firstly creates a request notice ann no, wherein the notice comprises notice id, data requirement, reward amount and information of a requester; data sharing service provider generates signature using its own private key and request announcement
Figure BDA00031220679200000422
Then, the data sharing service provider issues advertisement information AnnMsg = (ann | | | sig | | Y) d );
The data-aware upload includes: the data provider collects sensing data according to the request notice and encrypts the data by using a public key of the data requester obtained from a certificate authority; to ensure the integrity of the encrypted data D, the data provider generates a short-time anonymous signature using a short-time anonymous key
Figure BDA0003122067920000051
Then, the data provider passes the anonymous message msg = (D | | sig | | Y) k ||Cert k ) Sharing the encrypted data D to a data sharing service provider; in addition, for subsequent earning of the prizeThe data provider also stores the current short-time key pair and the anonymous certificate;
the data verification forwarding comprises the following steps:
a. the data sharing service provider first authenticates the data before receiving it to ensure that the source of the shared data is legitimate, the data sharing service provider first calculates:
Figure BDA0003122067920000052
Figure BDA0003122067920000053
Figure BDA0003122067920000054
b. after the data sharing service provider acquires the corresponding beta according to the timestamp, the following calculation results are calculated:
Figure BDA0003122067920000055
and judging whether c is equal to c'; if the equation holds, the data sharing service provider accepts the public key and anonymous certificate Y k ||Cert k }; otherwise, the data sharing service provider discards the data;
c. the data sharing service provider verifies the authenticity of the data using the following formula:
Figure BDA0003122067920000056
if the equation is true, the data sharing service provider will forward the encrypted data to the data requestor and will not expose any information of the data provider; if the equality is not true, the data will be discarded; in addition, the data sharing service provider records the abstract of the encrypted data D and the corresponding anonymous certificate, and is used for verifying the validity of the data provider in the prize drawing stage;
the data evaluation comprises the following steps: all data shared by data providers is divided into two types: qualified data is recorded as True; or unqualified data is recorded as False; and all eligible data providers will share the reward equally; the encrypted data received by the data requestor from the data sharing service provider can be decrypted using its private key and the data evaluated after decryption; the data requester records an evaluation table of data shared by all data providers, including encrypted data digests and evaluation results, in an evaluation chain; the data sharing service provider checks the evaluation result through the evaluation chain; if the data is evaluated as qualified data, the data sharing service provider locally establishes a link between the encrypted data digest and the corresponding anonymous certificate; thus, the data sharing service provider may infer whether an anonymous credential is eligible for a reward based on the set of summaries displayed on the evaluation chain.
Preferably, the prize drawing stage comprises generating parameters, anonymous identity verification and drawing rewards;
generating the parameters includes:
the data sharing service provider generating a common parameter for the reward; the data sharing service provider first selects two cryptographic hash functions H' and
Figure BDA0003122067920000061
for example, H': z q →Z q And are each and every
Figure BDA0003122067920000062
Then, the data sharing service provider selects theta epsilon Z q As a dynamic authentication key, in which the value of θ changes according to the request announcement ID; in addition, the data sharing service provider randomly selects three digits x 1 ,x 2 ,x 3 ∈Z q And calculate
Figure BDA0003122067920000063
Figure BDA0003122067920000064
Finally, the data sharing service provider publishes the reward parameters for the reward
Figure BDA0003122067920000065
In addition, the data sharing service provider generates two empty storage sets
Figure BDA0003122067920000066
And
Figure BDA0003122067920000067
to ensure that data providers eligible for rewards have only earned the reward once;
the anonymous identity verification comprises the following steps:
a. the data requester records data evaluation in the evaluation chain, so that the vehicle can obtain reward information by inquiring the evaluation chain;
b. data provider selection for earning rewards
Figure BDA0003122067920000068
To calculate
Figure BDA0003122067920000069
Then sends (M, H '(z') to the data sharing service provider using the key pair and anonymous credential used in the data provision phase 1 ));
c. The data sharing service provider judges whether the data provider is qualified to earn the reward according to the anonymous certificate of the data sharing service provider; if the data provider is qualified, and H' (z) 1 ) Not in Θ, the data sharing service provider will be H' (z) 1 ) Add to Θ and notify the data provider; thereafter, the data provider communicates with the data sharing service provider using its previous anonymous credential, in a zero-knowledge proof, the data provider acting as a prover and the data sharing service provider acting as a verifier for verification;
the verification process is as follows:
Figure BDA00031220679200000610
the prover:
selection of z a ,z β ∈Z q Calculating
Figure BDA00031220679200000611
Is provided with
Figure BDA00031220679200000612
Sending
Figure BDA00031220679200000613
To the verifier;
and (3) verifier:
computing
Figure BDA00031220679200000614
Examination of
Figure BDA00031220679200000615
d. If the validation is successful, the data sharing service provider sends a tuple (W, γ) to the data provider, where γ ∈ Z q And
Figure BDA0003122067920000071
then verify
Figure BDA0003122067920000072
Updated anonymous credential cred = (W, γ, z) 1 ,z 2 ) Storing the data to the local by a data provider;
the earning of the reward includes:
to ensure that each anonymous credential can only receive a reward once, the data provider will
Figure BDA0003122067920000073
As a reward token; in addition, the data provider sends the data to the data sharing service provider togetherSending the announcement id, and determining corresponding theta and reward by the data sharing service provider according to the announcement id; after the data provider passes the R and the announcement id to the data sharing service provider, the data provider uses the true identity to claim the reward; in this process, the data provider acts as a prover in the zero knowledge proof and the data sharing service provider acts as a verifier, thus gaining the reward of:
Figure BDA0003122067920000074
the proof may be converted and rewritten as:
Figure BDA0003122067920000075
wherein eta 1 ,η 2 ∈Z q
Figure BDA0003122067920000076
ξ 1 =η 1 γ, and ξ 2 =η 2 γ
The verification process is as follows:
the prover:
wave selection
Figure BDA0003122067920000077
Computing
Figure BDA0003122067920000078
Figure BDA0003122067920000079
Is provided with
Figure BDA00031220679200000710
Sending
Figure BDA00031220679200000711
Figure BDA00031220679200000712
To the verifier;
and (3) verifier:
computing
Figure BDA00031220679200000713
Inspection of
Figure BDA00031220679200000714
Figure BDA00031220679200000715
If the proof is successful and token R is not in the storage set Q, the data provider may obtain a reward from the data sharing service provider; in addition, the data sharing service provider will also receive some rewards, which when the data sharing service provider distributes rewards to the data providers, are deducted according to a pre-agreed ratio in the system as compensation for forwarding the data.
The technical scheme provided by the embodiment of the invention has the beneficial effects that at least:
in the data sharing system for the privacy protection of the internet of vehicles, provided by the embodiment of the invention, firstly, the vehicles can share the sensing data of the vehicles to other vehicles through certain rewards; secondly, in order to protect the privacy of the data sharing vehicle, an anonymous identity strategy is adopted to hide the real identity of the vehicle, so that the vehicle can share the data through an anonymous certificate; finally, two novel non-interactive zero-knowledge proofs are designed, and rewards are drawn from the system while the identity of the vehicle is hidden. Therefore, the method and the system can realize that the vehicle earns the reward while sharing the perception data of the vehicle, and the privacy can not be revealed.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a schematic structural diagram of a block chain-based vehicle networking privacy protection data sharing system according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of an evaluation chain provided by an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a transaction chain provided in an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
An embodiment of the present invention provides a block chain-based car networking privacy protection Data Sharing system, as shown in fig. 1, the system includes a Certificate Authority (CA), a Data Sharing Service Provider (DSSP), a vehicle, and Roadside Units (RSUs, not shown in the figure);
each vehicle in the internet of vehicles can communicate with roadside units and other vehicles to realize information sharing; vehicles in the internet of vehicles fall into two categories: a data requestor and a data provider; the data requester requests data from other vehicles in the internet of vehicles by sending data requests, and the data provider senses and collects the data and forwards the data to the data requester;
certificate Authorities (CAs) are used for vehicle registration, certificate issuance, certificate revocation and vehicle behavior monitoring. Specifically, once the vehicle is registered in the system, the CA should generate a vehicle certificate and record the identity of the vehicle in a database. Then, the certificate generated by the CA is distributed to the registered vehicles. Each vehicle in the internet of vehicles can apply for certificates of other vehicles to verify the identity of the vehicle. More importantly, the CA manages the certificates of all vehicles in the internet of vehicles, and if a vehicle violates a rule, the CA can revoke the certificate of the vehicle.
A Data Sharing Service Provider (DSSP) is the core of the system, and is used to publish data request announcements, forward collected data to data requesters, and reward data providers. Specifically, the DSSP forms a data request notice according to the request of the vehicle, and publishes the notice in the internet of vehicles. In addition, the DSSP forwards data collected by the data providers to the corresponding data requesters and assists the data requesters in paying rewards to the data providers that provide the qualifying data.
Furthermore, the operation of the system comprises three parts, namely an initialization stage, a data providing stage and a prize winning stage.
In the initialization phase:
1.1 the vehicle and the data sharing service provider send the required data to the certificate authority for registration;
1.2 certificate authorities publish communication parameters, generate anonymous certificates for vehicles, and generate key pairs for data sharing service providers.
In the data providing stage:
2.1 the data requester sends data request and relative reward to the data sharing service provider;
2.2 the data sharing service provider constructs and issues the data request announcement;
2.3 the data provider collects the data and sends the data encrypted in advance to the data sharing service provider by using the pseudonym identity;
2.4 the data sharing service provider checks the legitimacy of the received data with an anonymous certificate, the legitimate data being forwarded to the data requestor without revealing owner information, wherein the owner information comprises a pseudonymous identity;
2.5 the data requester evaluates the received data and records the evaluation information in the evaluation chain.
In the stage of prize winning:
3.1 the data sharing service provider generates public parameters for qualified data providers to obtain rewards;
3.2 each data provider checks whether its shared data can receive rewards; if so, the qualified data provider uses its pseudonym identity to receive a reward from the data sharing service provider; the data sharing service provider then sends an anonymous credential to the data provider eligible for the reward;
3.3 the data provider rewards its real account by using anonymous voucher and reward token;
3.4 the data sharing service provider records the transaction information in the transaction chain after sending the reward to the qualified data provider.
Further, the initialization phase includes vehicle and data sharing service provider registration, and anonymous certificate generation.
Wherein the vehicle and data sharing service provider registration comprises: any vehicle intending to participate in data sharing must register with the certificate authority to obtain a legal identity, and in the process of registration, the vehicle submits required information to the certificate authority, and the registered vehicle is identified as a legal vehicle; likewise, the data sharing service provider also needs to register with the certificate authority to obtain a legitimate identity.
Anonymous certificate generation includes:
1) Vehicle anonymous certificate generation:
a. the certificate authority generates three multiplicative cyclic groups G of the same order q 1 ,G 2 ,G T Wherein q is a large prime number, g 1 ,g 2 Are each G 1 ,G 2 And e (,) represents a bilinear map, e: g 1 ×G 2 →G T (ii) a Certificate authority selects two random numbers
Figure BDA0003122067920000101
As a master key, and calculates
Figure BDA0003122067920000102
And
Figure BDA0003122067920000103
the certificate authority also selects a secure cryptographic hash function
Figure BDA0003122067920000104
Certificate authority selecting random number
Figure BDA0003122067920000105
And calculate
Figure BDA0003122067920000106
As a daily authentication key, the vehicle requests the corresponding β from the timestamp, and then issues the tuple { q, e, g 1 ,g 2 ,G 1 ,G 2 ,G T ,P 1 ,P 2 H, β } as a common communication parameter;
b. if the vehicle registration is successful, the certificate authority begins to distribute the key for the vehicle; certificate authority as vehicle v i Creating a real identity
Figure BDA0003122067920000107
And a false identity
Figure BDA0003122067920000108
Figure BDA0003122067920000109
Wherein the random number
Figure BDA00031220679200001010
In addition, the certificate authority selects a random number
Figure BDA00031220679200001011
And calculate
Figure BDA00031220679200001012
Finally, the certificate authority stores it locally
Figure BDA00031220679200001013
And authorizes the key
Figure BDA00031220679200001014
Wherein
Figure BDA00031220679200001015
Figure BDA00031220679200001016
c. When the vehicle intends to participate in data sharing, generating an anonymous certificate using the AK; randomly selecting some data for each vehicle
Figure BDA00031220679200001017
As short-time private key, calculating corresponding short-time public key
Figure BDA00031220679200001018
Wherein k =1,2, ·, l; then, the vehicle selects a random number
Figure BDA00031220679200001019
And calculate
Figure BDA00031220679200001020
Figure BDA0003122067920000111
Figure BDA0003122067920000112
Figure BDA0003122067920000113
In calculating
Figure BDA0003122067920000114
After the values of (c), the vehicle calculates the verification parameters c and delta 1 ,δ 2
Figure BDA0003122067920000115
δ 1 =(r k -c 1 )mod q,δ 2 =(r k -c 2 )mod q.
d. Finally, the anonymous certificate is represented as:
Figure BDA0003122067920000116
2) Data sharing service provider anonymous certificate generation:
certificate authority generating random numbers
Figure BDA0003122067920000117
And calculate
Figure BDA0003122067920000118
The certificate authority then sends a key pair (r) d ,Y d ) To the data sharing service provider, where r d Is a private key, Y d Is a public key.
Further, the data submitting phase comprises vehicle data request, issuing request notice, data sensing uploading, data verification forwarding and data evaluation.
1) The vehicle request data includes: if the vehicle needs data, firstly, sending the data request and the corresponding reward to a data sharing service provider; at the end of the data sharing, the data sharing service provider evenly distributes rewards to the data providers; in addition, the data requestor sends its public key to the certificate authority, and the data provider encrypts the sensory data using the public key.
2) The issuing of the request announcement includes: after receiving the reward, the data sharing service provider firstly creates a request notice ann no, wherein the notice comprises notice id, data requirement, reward amount and information of a requester; data sharing service provider generates signature using its own private key and request announcement
Figure BDA0003122067920000119
The data sharing service provider then issues announcement information AnnMsg = (ann | | | sig | | Y) d )。
3) The data-aware upload includes: the data provider collects the sensing data according to the request notice and encrypts the data by using a public key of the data requester obtained from a certificate authority; to ensure the integrity of the encrypted data D, the data provider generates a short-time anonymous signature using a short-time anonymous key
Figure BDA00031220679200001110
Then, the data provider passes the anonymous message msg = (D | | sig | | Y) k ||Cert k ) Sharing the encrypted data D to a data sharing service provider; in addition, the data provider also stores the current short-time key pair and anonymous certificate for subsequent earnings of rewards.
4) The data verification forwarding comprises the following steps:
a. the data sharing service provider first verifies the data before receiving it to ensure that the source of the shared data is legitimate, and first calculates:
Figure BDA0003122067920000121
Figure BDA0003122067920000122
Figure BDA0003122067920000123
b. after the data sharing service provider acquires the corresponding beta according to the timestamp, the following calculation results are calculated:
Figure BDA0003122067920000124
and judging whether c is equal to c'; if the equation holds, the data sharing service provider accepts the public key and anonymous certificate Y k ||Cert k }; otherwise, the data sharing service provider discards the data;
c. the data sharing service provider verifies the authenticity of the data using the following formula:
Figure BDA0003122067920000125
if the equation is true, the data sharing service provider will forward the encrypted data to the data requestor and will not expose any information of the data provider; if the equality is not true, the data will be discarded; in addition, the data sharing service provider will record the digest of the encrypted data D and its corresponding anonymous certificate, which is used to verify the validity of the data provider in the prize drawing stage.
5) The data evaluation comprises the following steps: all data shared by data providers is divided into two types: qualified data is recorded as True; or unqualified data is recorded as False; and all eligible data providers will share the reward equally; the encrypted data received by the data requestor from the data sharing service provider can be decrypted using its private key and the data evaluated after decryption; the data requester records an evaluation table of data shared by all data providers, including encrypted data digests and evaluation results, in an evaluation chain; the data sharing service provider checks the evaluation result through the evaluation chain; if the data is evaluated as qualified data, the data sharing service provider locally establishes a link between the encrypted data digest and the corresponding anonymous certificate; thus, the data sharing service provider may infer from the set of summaries displayed on the evaluation chain whether the anonymous credential qualifies for an incentive.
Further, the prize drawing stage includes generating parameters, anonymous identity verification and drawing prizes.
1) Generating the parameters includes:
the data sharing service provider generating a common parameter for the reward; data ofThe sharing service provider first selects two cryptographic hash functions H' and
Figure BDA0003122067920000126
for example, H': z q →Z q And are each and every
Figure BDA0003122067920000127
Then, the data sharing service provider selects θ ∈ Z q As a dynamic authentication key, in which the value of θ changes according to the request announcement ID; in addition, the data sharing service provider randomly selects three digits x 1 ,x 2 ,x 3 ∈Z q And calculate
Figure BDA0003122067920000128
Figure BDA0003122067920000131
Finally, the data sharing service provider publishes the reward parameters for the reward
Figure BDA0003122067920000132
In addition, the data sharing service provider generates two empty storage sets
Figure BDA0003122067920000133
And
Figure BDA0003122067920000134
to ensure that data providers eligible for rewards have only drawn rewards once;
2) The anonymous identity verification comprises the following steps:
a. the data requester records data evaluation in the evaluation chain, so that the vehicle can obtain reward information by inquiring the evaluation chain;
b. data provider selection for earning rewards
Figure BDA0003122067920000135
To calculate
Figure BDA0003122067920000136
Then sends (M, H '(z') to the data sharing service provider using the key pair and anonymous credential used in the data provision phase 1 ));
c. The data sharing service provider judges whether the data provider is qualified to earn the reward according to the anonymous certificate of the data sharing service provider; if the data provider is qualified, and H' (z) 1 ) Not in Θ, the data sharing service provider will H' (z) 1 ) Add to Θ and notify the data provider; thereafter, the data provider communicates with the data sharing service provider using its previous anonymous credential, in a zero-knowledge proof, the data provider acts as a prover and the data sharing service provider acts as a verifier for verification;
the verification process is as follows:
Figure BDA0003122067920000137
the prover:
selection of z a ,z β ∈Z q Calculating
Figure BDA0003122067920000138
Is provided with
Figure BDA0003122067920000139
Sending
Figure BDA00031220679200001310
To the verifier;
and (3) verifier:
computing
Figure BDA00031220679200001311
Examination of
Figure BDA00031220679200001312
d. If the verification is successful, the data sharing service providesThe quotient sends a tuple (W, γ) to the data provider, where γ ∈ Z q And
Figure BDA00031220679200001313
then verify
Figure BDA00031220679200001314
Updated anonymous credential cred = (W, γ, z) 1 ,z 2 ) Storing the data to the local by a data provider;
3) The earning of the reward includes:
to ensure that each anonymous credential can only receive a reward once, the data provider will
Figure BDA00031220679200001315
As a reward token; in addition, the data provider also sends an announcement id to the data sharing service provider together, and the data sharing service provider determines corresponding theta and reward according to the announcement id; after the data provider passes the R and the announcement id to the data sharing service provider, the data provider uses the true identity to claim the reward; in this process, the data provider acts as a prover in the zero knowledge proof and the data sharing service provider acts as a verifier, thus gaining the reward of:
Figure BDA0003122067920000141
the proof may be converted and rewritten as:
Figure BDA0003122067920000142
wherein eta 1 ,η 2 ∈Z q
Figure BDA0003122067920000143
ξ 1 =η 1 γ, and ξ 2 =η 2 γ
The verification process is as follows:
the prover:
selecting
Figure BDA0003122067920000144
Computing
Figure BDA0003122067920000145
Figure BDA0003122067920000146
Is provided with
Figure BDA0003122067920000147
Sending
Figure BDA0003122067920000148
Figure BDA0003122067920000149
To the verifier;
and (3) verifier:
computing
Figure BDA00031220679200001410
Inspection of
Figure BDA00031220679200001411
Figure BDA00031220679200001412
If the proof is successful and token R is not in the stored set Q, the data provider may obtain an incentive from the data sharing service provider; in addition, the data sharing service provider will also receive some rewards, which when the data sharing service provider distributes rewards to the data providers, are deducted according to a pre-agreed ratio in the system as compensation for forwarding the data.
Further, the block chain structure of the system of the invention comprises two parts, namely an evaluation chain and a transaction chain.
The evaluation chain is used for storing evaluation information of data provided by a data provider, and the evaluation information is issued by a data requester. As shown in fig. 2, the body of the evaluation chain includes id of the data request advertisement, encrypted data digest, evaluation result, digital signature. Wherein the id of the data request advertisement is determined by the data sharing service provider that issued the advertisement. The encrypted data digest is a data digest generated from encrypted data. The evaluation result is only true or false. Finally, the evaluation record is signed by the data requestor to form a digital signature of the record. Once the requestor issues the ratings information for the data request, the data sharing service provider and all related data providers may query the results of the ratings for each piece of data provided. The data sharing service provider should distribute the reward to all data providers rated true based on the information on the rating chain.
The transaction chain is used for storing transaction information. As shown in fig. 3, the transaction item includes a data request announcement id, an award amount, a time stamp, a signature of the data requester, and a signature of the data provider. Wherein the data request announcement id is used to indicate which data request announcement the data provider gets a reward for. The total amount of rewards advertised per data request is predetermined by the data requestor. Once the data provider receives the reward, the data sharing service provider will publish the transaction on the blockchain. All transactions on the transaction chain should be audited and not tampered with.
In summary, in the data sharing system for privacy protection in the internet of vehicles provided by the embodiment of the invention, the vehicle can share the sensing data thereof with other vehicles through a certain reward; in order to protect the privacy of the data sharing vehicle, an anonymous identity strategy is adopted to hide the real identity of the vehicle, so that the vehicle can share data through an anonymous certificate; two novel non-interactive zero-knowledge proofs are designed, and reward drawing from the system is realized while the identity of the vehicle is hidden. Therefore, the method and the system can realize that the vehicle earns the reward while sharing the perception data of the vehicle, and the privacy can not be revealed.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (5)

1. A block chain-based vehicle networking privacy protection data sharing system is characterized by comprising a certificate authority, a data sharing service provider, a vehicle and roadside units;
each vehicle in the internet of vehicles can communicate with the roadside unit and other vehicles to realize information sharing; the vehicles are divided into data requesters and data providers, the data requesters request data from other vehicles in the Internet of vehicles by sending data requests, and the data providers sense and collect the data and then provide the data to the data requesters;
the certificate authority is used for vehicle registration, certificate issuance, certificate revocation and vehicle behavior monitoring; the data sharing service provider is the core of the system and is used for issuing a data request notice, forwarding the collected data to the data requester and assisting the data requester to reward the data provider;
the operation of the system comprises three parts, namely an initialization stage, a data providing stage and a prize drawing stage;
in the initialization phase:
the vehicle and the data sharing service provider send the required data to a certificate authority for registration;
the certificate management mechanism publishes communication parameters, generates an anonymous certificate for the vehicle and generates a key pair for a data sharing service provider;
in the data providing stage:
the data requester sends a data request and a corresponding reward to the data sharing service provider;
the data sharing service provider constructs and issues a data request notice;
the data provider collects the data and sends the data encrypted in advance to the data sharing service provider by using the pseudonym identity;
the data sharing service provider checks the validity of the received data by using an anonymous certificate, and the valid data is forwarded to the data requester without exposing owner information, wherein the owner information comprises a pseudonym identity;
the data requester evaluates the received data and records evaluation information in an evaluation chain;
in the stage of prize receiving:
the data sharing service provider generates public parameters for qualified data providers to obtain rewards;
each data provider checks whether its shared data can receive a reward; if so, the qualified data provider uses its pseudonym identity to receive a reward from the data sharing service provider; the data sharing service provider then sends an anonymous credential to the data provider eligible for the reward;
the data provider rewards its real account by using anonymous voucher and reward token;
after the data sharing service provider sends rewards to qualified data providers, the transaction information is recorded in a transaction chain;
the initialization stage comprises vehicle and data sharing service provider registration and anonymous certificate generation;
vehicle and data sharing service provider registration includes: any vehicle intending to participate in data sharing must register with the certificate authority to obtain a legal identity, and in the registration process, the vehicle submits required information to the certificate authority, and the registered vehicle is identified as a legal vehicle; likewise, the data sharing service provider also needs to register in the certificate authority to obtain a legitimate identity;
anonymous certificate generation includes:
vehicle anonymous certificate generation:
a. the certificate authority generates three multiplicative cyclic groups G of the same order q 1 ,G 2 ,G T Wherein q is a macroproteinNumber, g 1 ,g 2 Are each G 1 ,G 2 And e (,) represents a bilinear map, e: g 1 ×G 2 →G T (ii) a Certificate authority selects two random numbers
Figure FDA0003936246330000021
As a master key, and calculates
Figure FDA0003936246330000022
And
Figure FDA0003936246330000023
the certificate authority also selects a secure cryptographic hash function H:
Figure FDA0003936246330000024
certificate authority selecting random number
Figure FDA0003936246330000025
Figure FDA0003936246330000026
And calculate
Figure FDA0003936246330000027
As a daily authentication key, the vehicle requests the corresponding β from the timestamp, and then issues the tuple { q, e, g 1 ,g 2 ,G 1 ,G 2 ,G T ,P 1 ,P 2 H, β } as a common communication parameter;
b. if the vehicle registration is successful, the certificate authority begins to distribute the key for the vehicle; certificate authority as vehicle v i Creating a real identity
Figure FDA0003936246330000028
And a false identity
Figure FDA0003936246330000029
Figure FDA00039362463300000210
Figure FDA00039362463300000211
Wherein the random number
Figure FDA00039362463300000212
In addition, the certificate authority selects a random number
Figure FDA00039362463300000213
And calculate
Figure FDA00039362463300000214
Finally, the certificate authority stores it locally
Figure FDA00039362463300000215
And authorizes the key
Figure FDA00039362463300000216
Wherein
Figure FDA00039362463300000217
Figure FDA00039362463300000218
c. Generating an anonymous certificate using the AK when the vehicle is intended to participate in data sharing; randomly selecting some data for each vehicle
Figure FDA00039362463300000219
l is less than or equal to n is used as a short-time private key, and a corresponding short-time public key is calculated
Figure FDA00039362463300000220
Wherein k =1,2, …, l; then, the vehicle selects a random number
Figure FDA00039362463300000221
And calculate
Figure FDA00039362463300000222
λ,λ 12 ,
Figure FDA00039362463300000223
E′ i
Figure FDA00039362463300000224
λ=(μ+r k )mod q,
Figure FDA00039362463300000225
Figure FDA00039362463300000226
E′ i =e(E i ,β)
In calculating
Figure FDA00039362463300000227
λ,λ 12 ,
Figure FDA00039362463300000228
E' i After the value of (d), the vehicle calculates the verification parameters c and δ 1 ,δ 2
Figure FDA0003936246330000031
δ 1 =(r k -c 1 )mod q,δ 2 =(r k -c 2 )mod q.
d. Finally, the anonymous credential is represented as:
Figure FDA0003936246330000032
data sharing service provider anonymous certificate generation:
certificate authority generated random numbers
Figure FDA0003936246330000033
And calculate
Figure FDA0003936246330000034
The certificate authority then sends a key pair (r) d ,Y d ) To the data sharing service provider, where r d Is a private key, Y d Is a public key;
the data submitting stage comprises vehicle request data, issuing request bulletin, data sensing uploading, data verification forwarding and data evaluation;
the vehicle request data includes: if the vehicle needs data, firstly, sending the data request and the corresponding reward to a data sharing service provider; at the end of data sharing, the data sharing service provider evenly distributes rewards to the data providers; in addition, the data requester sends its public key to the certificate authority, and the data provider encrypts the sensing data using the public key;
the issuing of the request announcement includes: after receiving the reward, the data sharing service provider firstly creates a request notice ann no, wherein the notice comprises notice id, data requirement, reward amount and information of a requester; data sharing service provider generates signature using its own private key and request announcement
Figure FDA0003936246330000035
Then, the data sharing service provider issues advertisement information AnnMsg = (anno | | | sig | | Y) d );
Data-aware upload includes a data provider collecting the awareness data from a request announcement and using a public key of a data requestor obtained from a certificate authorityEncrypting the data; to ensure the integrity of the encrypted data D, the data provider generates a short-time anonymous signature using a short-time anonymous key
Figure FDA0003936246330000036
Then, the data provider passes the anonymous message msg = (D | | sig | | Y) k ||Cert k ) Sharing the encrypted data D to a data sharing service provider; in addition, the data provider also stores the current short-time key pair and anonymous certificate for subsequent earning of the reward;
the data verification forwarding comprises the following steps:
a. the data sharing service provider first authenticates the data before receiving it to ensure that the source of the shared data is legitimate, the data sharing service provider first calculates:
Figure FDA0003936246330000037
Figure FDA0003936246330000038
Figure FDA0003936246330000039
b. after the data sharing service provider acquires the corresponding beta according to the timestamp, the following calculation results are calculated:
Figure FDA0003936246330000041
and judging whether c is equal to c'; if the equation holds, the data sharing service provider accepts the public key and anonymous certificate Y k ||Cert k }; otherwise, the data sharing service provider discards the data;
c. the data sharing service provider verifies the authenticity of the data using the following formula:
Figure FDA0003936246330000042
if the equation is true, the data sharing service provider will forward the encrypted data to the data requestor and will not expose any information of the data provider; if the equality is not true, the data will be discarded; in addition, the data sharing service provider records the abstract of the encrypted data D and the corresponding anonymous certificate, and is used for verifying the validity of the data provider in the prize drawing stage;
the data evaluation includes that all data shared by data providers are divided into two types: qualified data is recorded as True; or unqualified data is recorded as False; and all eligible data providers will share the reward equally; the encrypted data received by the data requestor from the data sharing service provider can be decrypted using its private key and the data evaluated after decryption; the data requester records an evaluation table of data shared by all data providers, including encrypted data digests and evaluation results, in an evaluation chain; the data sharing service provider checks the evaluation result through the evaluation chain; if the data is evaluated as qualified data, the data sharing service provider locally establishes a link between the encrypted data digest and the corresponding anonymous certificate; thus, the data sharing service provider may infer from the set of summaries displayed on the evaluation chain whether the anonymous credential qualifies for an incentive.
2. The internet of vehicles privacy preserving data sharing system of claim 1, wherein the certificate authority is specifically configured to:
when the vehicle is registered in the system, generating a vehicle certificate and recording the identity of the vehicle in a database;
distributing the generated certificate to registered vehicles;
and managing the certificates of all vehicles in the Internet of vehicles, and if the vehicles violate the rules, revoking the certificates of the vehicles.
3. The internet of vehicles privacy preserving data sharing system of claim 1, wherein the data sharing service provider is specifically configured to:
forming a data request notice according to the request of the data requester, and issuing the data request notice in the Internet of vehicles;
the data collected by the data providers is forwarded to the corresponding data requesters and assists the data requesters in paying rewards to the data providers that provide the qualified data.
4. The vehicle networking privacy protecting data sharing system according to claim 1, wherein the block chain structure of the system comprises two parts, namely an evaluation chain and a transaction chain;
the evaluation chain is used for storing evaluation information of data provided by a data provider, and the evaluation information is issued by a data requester;
the transaction chain is used for storing transaction information.
5. The vehicle networking privacy protecting data sharing system of claim 1, wherein the prize drawing phase comprises generating parameters, anonymous identity verification, and drawing rewards;
the generating parameters include:
the data sharing service provider generating a common parameter for the reward; the data sharing service provider first selects two cryptographic hash functions H' and
Figure FDA0003936246330000051
H':Z q →Z q and are each and every
Figure FDA0003936246330000052
{0,1} * →Z q (ii) a Then, the data sharing service provider selects theta epsilon Z q As a dynamic authentication key, in which the value of θ changes according to the request announcement ID; in addition, the data sharing service provider randomly selects three digits x 1 ,x 2 ,x 3 ∈Z q And calculate
Figure FDA0003936246330000053
Figure FDA0003936246330000054
Finally, the data sharing service provider publishes the reward parameters for the reward
Figure FDA0003936246330000055
In addition, the data sharing service provider generates two empty storage sets
Figure FDA0003936246330000056
And
Figure FDA0003936246330000057
to ensure that data providers eligible for rewards have only drawn rewards once;
the anonymous identity verification comprises the following steps:
a. the data requester records data evaluation in the evaluation chain, so that the vehicle can obtain reward information by inquiring the evaluation chain;
b. data provider selection for earnable rewards
Figure FDA0003936246330000058
To calculate
Figure FDA0003936246330000059
Then sends (M, H '(z') to the data sharing service provider using the key pair and anonymous credential used in the data provision phase 1 ));
c. The data sharing service provider judges whether the data provider is qualified to earn the reward according to the anonymous certificate of the data sharing service provider; if the data provider is qualified, and H' (z) 1 ) Not in Θ, the data sharing service provider will be H' (z) 1 ) Add to Θ and notify the data provider; thereafter, the data provider communicates with the data sharing service provider using its previous anonymous credential, and in zero knowledge proof, the data providerThe supplier acts as a prover and the data sharing service provider acts as a verifier for verification;
the verification process is as follows:
Figure FDA00039362463300000510
the prover:
selection of z a ,z β ∈Z q Calculating
Figure FDA00039362463300000511
Is provided with
Figure FDA00039362463300000512
Sending
Figure FDA00039362463300000513
To the verifier;
and (3) verifier:
computing
Figure FDA0003936246330000061
Examination of
Figure FDA0003936246330000062
d. If the verification is successful, the data sharing service provider sends a tuple (W, γ) to the data provider, where γ ∈ Z q And
Figure FDA0003936246330000063
then verify
Figure FDA0003936246330000064
Updated anonymous credential cred = (W, γ, z) 1 ,z 2 ) Storing the data to the local by a data provider;
the earning of the reward includes:
to ensure that each anonymous credential can only receive a reward once, the data provider will
Figure FDA0003936246330000065
As a reward token; in addition, the data provider also sends an announcement id to the data sharing service provider together, and the data sharing service provider determines corresponding theta and reward according to the announcement id; after the data provider passes the R and the announcement id to the data sharing service provider, the data provider uses the true identity to claim the reward; in this process, the data provider acts as a prover in the zero knowledge proof and the data sharing service provider acts as a verifier, thus gaining the reward of:
Figure FDA0003936246330000066
the proof may be converted and rewritten as:
Figure FDA0003936246330000067
wherein eta 12 ∈Z q ,
Figure FDA0003936246330000068
ξ 1 =η 1 γ, and ξ 2 =η 2 γ
The verification process is as follows:
the prover:
selecting
Figure FDA0003936246330000069
Computing
Figure FDA00039362463300000610
Figure FDA00039362463300000611
Is provided with
Figure FDA00039362463300000612
Sending
Figure FDA00039362463300000613
Figure FDA00039362463300000614
To the verifier;
and (3) verifier:
computing
Figure FDA00039362463300000615
Examination of
Figure FDA0003936246330000071
Figure FDA0003936246330000072
If the proof is successful and token R is not in the stored set Q, the data provider may obtain an incentive from the data sharing service provider; in addition, the data sharing service provider will also receive some rewards, which when the data sharing service provider distributes rewards to the data providers, are deducted according to a pre-agreed ratio in the system as compensation for forwarding the data.
CN202110679847.7A 2021-06-18 2021-06-18 Vehicle networking privacy protection data sharing system based on block chain Active CN113507452B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110679847.7A CN113507452B (en) 2021-06-18 2021-06-18 Vehicle networking privacy protection data sharing system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110679847.7A CN113507452B (en) 2021-06-18 2021-06-18 Vehicle networking privacy protection data sharing system based on block chain

Publications (2)

Publication Number Publication Date
CN113507452A CN113507452A (en) 2021-10-15
CN113507452B true CN113507452B (en) 2023-01-24

Family

ID=78010559

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110679847.7A Active CN113507452B (en) 2021-06-18 2021-06-18 Vehicle networking privacy protection data sharing system based on block chain

Country Status (1)

Country Link
CN (1) CN113507452B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114065253B (en) * 2021-11-22 2023-03-24 上海旺链信息科技有限公司 Method for anonymous sharing and verification of certificate and result
CN114500368B (en) * 2022-04-07 2022-06-17 成都网讯优速信息技术有限公司 Data transmission method and device and router adopting device
CN114841818B (en) * 2022-04-18 2023-06-16 北京交通大学 Customized car insurance bidding privacy protection method based on cross-chain technology
CN114978687B (en) * 2022-05-20 2024-04-09 江苏大学 Efficient anonymous authentication method based on blockchain technology in Internet of vehicles environment

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111967051A (en) * 2020-08-27 2020-11-20 安徽大学 Block chain-based inter-vehicle data safety sharing method and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9202230B2 (en) * 2010-04-06 2015-12-01 Intel Corporation Techniques for monetizing anonymized context
CN109978623B (en) * 2019-03-27 2021-11-16 杭州师范大学 Vehicle networking information sharing excitation method based on block chain

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111967051A (en) * 2020-08-27 2020-11-20 安徽大学 Block chain-based inter-vehicle data safety sharing method and system

Also Published As

Publication number Publication date
CN113507452A (en) 2021-10-15

Similar Documents

Publication Publication Date Title
CN113507452B (en) Vehicle networking privacy protection data sharing system based on block chain
US11397968B2 (en) Methods and system for serving targeted advertisements to a consumer device
Ray et al. An anonymous electronic voting protocol for voting over the internet
US7571324B2 (en) Method and device for anonymous signature with a shared private key
CN110677395B (en) Security-based incentive method with privacy protection function and real-time map updating system
Wang et al. A privacy and efficiency-oriented data sharing mechanism for iots
CN113949544A (en) DAG block chain-based lightweight authentication and access authorization method for Internet of things equipment
Wu et al. An electronic voting mechanism for fighting bribery and coercion
Zhang et al. A secure and efficient decentralized access control scheme based on blockchain for vehicular social networks
Zhu et al. Anonymous voting scheme for boardroom with blockchain
CN115442048A (en) VANET-oriented block chain-based anonymous authentication method
Khan et al. A privacy-preserving and transparent identity management scheme for vehicular social networking
CN117375797A (en) Anonymous authentication and vehicle-mounted information sharing method based on blockchain and zero knowledge proof
WO2007095691A1 (en) Anonymous authentication
CN110365671B (en) Crowd sensing incentive mechanism method supporting privacy protection
CN105763572A (en) Digital lottery selling, running and expiry method based on public key signatures
Wang et al. Building a consumer scalable anonymity payment protocol for Internet purchases
JP2007287104A (en) Anonymous order system, apparatus and program
JP4971917B2 (en) Signature generation device, signature verification device, group management device, and program thereof
JP2000155789A (en) System and method for electronic polling and storage medium
Nilsson et al. Publicly Auditable Privacy Revocation in Practice
KR100338330B1 (en) Voting method for a receipt-free electronic voting system
Chen et al. Design of a fair proxy raffle protocol on the Internet
Huang et al. A secure and lightweight micro-payment scheme in P2P networks
Tasidou Personal data utilization and protection through algorithms and protocols for privacy-preserving electronic transactions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant