WO2018205263A1 - Sybil attack defense method and system - Google Patents

Sybil attack defense method and system Download PDF

Info

Publication number
WO2018205263A1
WO2018205263A1 PCT/CN2017/084174 CN2017084174W WO2018205263A1 WO 2018205263 A1 WO2018205263 A1 WO 2018205263A1 CN 2017084174 W CN2017084174 W CN 2017084174W WO 2018205263 A1 WO2018205263 A1 WO 2018205263A1
Authority
WO
WIPO (PCT)
Prior art keywords
algorithm
signature
user
preset
key generation
Prior art date
Application number
PCT/CN2017/084174
Other languages
French (fr)
Chinese (zh)
Inventor
张鹏
喻建平
张霞飞
Original Assignee
深圳大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳大学 filed Critical 深圳大学
Priority to PCT/CN2017/084174 priority Critical patent/WO2018205263A1/en
Publication of WO2018205263A1 publication Critical patent/WO2018205263A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • the present invention relates to the field of data authentication technologies in network communications, and in particular, to a witch attack defense method and system thereof.
  • wearable smart devices have become increasingly popular, the development of cloud computing has matured, the scale of mobile Internet users has increased year by year, the value of big data has accelerated, medical services have evolved from informationization to mobile and networked, and mobile medical networks have gradually formed.
  • the wearable device collects the health information of the residents, and analyzes and processes the collected data according to the cloud platform, and then provides the health monitoring and clinical diagnosis to the hospital and the doctor.
  • the mobile medical network can improve the patient's medical experience, improve the diagnosis and treatment efficiency of doctors, reduce the social cost of medical services, and effectively improve the health status of residents and the social medical environment.
  • Mobile medical networks can provide users with social networking services such as forwarding health information, sharing fitness experiences, and communicating treatment experiences.
  • mobile medical social networks are vulnerable to malicious attacks.
  • an attacker pretends to be the identity of multiple legitimate users, or illegally declares multiple forged user identities, the social network is attacked by a witch.
  • Witch attacks can degrade network performance, interrupt programs, tamper with data, or maliciously deceive others, thus causing significant damage to the performance of mobile medical social networks.
  • the object of the present invention is to provide a witch attack defense method and a system thereof, aiming at solving the problem that the mobile medical social network is vulnerable to witch attacks in the prior art.
  • the present invention provides a witch attack defense method, which is applied to a mobile medical social network composed of a key generation center, a cloud service provider, and a user, wherein the method includes:
  • a registration step submitting a registration application to the secret key generation center by the user, and executing a preset key generation algorithm by the key generation center to generate a user private key SK S and privately Key SK S is distributed to the user;
  • Signing step the user signs by running a preset signature algorithm
  • Verification step The user verifies the signature by running a preset verification algorithm after signing.
  • the setting algorithm is a Setup ( ⁇ , U) algorithm
  • the step of running the preset Setup ( ⁇ , U) algorithm specifically includes:
  • the key generation algorithm is a KeyGen (PP, MSK, S) algorithm, wherein the step of running the preset KeyGen (PP, MSK, S) algorithm specifically includes:
  • the user private key SK S (AS i , i ⁇ S ⁇ U * ) is output.
  • the signature algorithm is Algorithm in which the preset is run
  • the steps of the algorithm specifically include:
  • the output probability is the probability
  • the verification algorithm is Algorithm in which the preset is run
  • the steps of the algorithm specifically include:
  • the present invention further provides a witch attack defense system, which is applied to a mobile medical social network composed of a key generation center, a cloud service provider, and a user, wherein the system includes:
  • a registration module configured to submit a registration application to the secret key generation center by using the user, and the secret key generation algorithm runs a preset secret key generation algorithm to generate a user private key SK S and User private key SK S is distributed to the user;
  • a signature module configured to: the user signs by running a preset signature algorithm
  • the verification module is configured to verify the signature of the user by running a preset verification algorithm after signing.
  • the setting algorithm is a Setup ( ⁇ , U) algorithm, wherein the step of running the preset Setup ( ⁇ , U) algorithm specifically includes:
  • the key generation algorithm is a KeyGen (PP, MSK, S) algorithm
  • the step of running the preset KeyGen (PP, MSK, S) algorithm specifically includes:
  • the user private key SK S (AS i , i ⁇ S ⁇ U * ) is output.
  • the signature algorithm is Algorithm in which the preset is run
  • the steps of the algorithm specifically include:
  • the distribution from the standard deviation is ⁇
  • the output probability is the probability
  • the verification algorithm is Algorithm in which the preset is run
  • the steps of the algorithm specifically include:
  • the technical solution provided by the present invention is applicable to a mobile medical social network, and an anonymous authentication protocol is proposed, which uses multiple attributes of a user instead of a single identity to access a service, thereby preventing potential witch attacks and identity privacy leakage, and improving data. safety.
  • FIG. 1 is a flowchart of a witch attack defense method according to an embodiment of the present invention
  • FIG. 2 is a schematic diagram showing the internal structure of a witch attack defense system 10 according to an embodiment of the present invention
  • FIG. 3 is a schematic diagram of a running time of a signature algorithm in a defense scheme according to an embodiment of the present invention
  • FIG. 4 is a schematic diagram of a running time of a verification algorithm in a defense scheme according to an embodiment of the present invention.
  • a specific embodiment of the present invention provides a witch attack defense method, which is applied to a mobile medical social network composed of a key generation center, a cloud service provider, and a user, wherein the method includes:
  • a registration step submitting a registration application to the secret key generation center by the user, and executing a preset key generation algorithm by the key generation center to generate a user private key SK S and privately Key SK S is distributed to the user;
  • Signing step the user signs by running a preset signature algorithm
  • Verification step The user verifies the signature by running a preset verification algorithm after signing.
  • the invention provides a witch attack defense method suitable for a mobile medical social network, and proposes an anonymous authentication protocol, which uses multiple attributes of a user instead of a single identity to access a service, thereby preventing potential witch attacks and identity privacy. Leakage to improve data security.
  • a witch attack defense method provided by the present invention will be described in detail below.
  • FIG. 1 is a flowchart of a witch attack defense method according to an embodiment of the present invention.
  • the witch attack defense method is applied to a mobile phone composed of a Key Generation Center (KGC), a Cloud Service Provider (CSP), and a user (including a signer and a verifier).
  • KGC Key Generation Center
  • CSP Cloud Service Provider
  • a user including a signer and a verifier
  • Medical social network usually, KGC is used to set up the system and issue private keys to legitimate users.
  • CSP provides users with medical health data storage services. It is also a potential witch attacker to tamper with or falsify users' health data.
  • Users use certain terminals ( For example, smartphones, laptops, etc.) and applications to periodically access the social platform, the signer refers to the user who wants to share the health data stored in the CSP, and the verifier refers to the user who has a social relationship with the signer.
  • the initialization step is used to establish a registration system.
  • the setting algorithm is a Setup ( ⁇ , U) algorithm, wherein the step of running the preset Setup ( ⁇ , U) algorithm specifically includes:
  • step S2 the registration step is: submitting a registration application to the secret key generation center by the user, and executing a preset key generation algorithm by the key generation center to generate a user private key SK S and passing the secret channel Distributing the user private key SK S to the user.
  • the key generation algorithm is a KeyGen (PP, MSK, S) algorithm, wherein the step of executing the preset KeyGen (PP, MSK, S) algorithm is specific include:
  • the user private key SK S (AS i , i ⁇ S ⁇ U * ) is output.
  • step S3 a signature step: the user signs by running a preset signature algorithm.
  • the doctor has the private key SK S of the attribute set S, such as "Hospital A, Pediatrics, Chief Physician", in order to defend against witch attacks and protect identity privacy, the doctor runs Algorithm to prove that he is a valid user.
  • the present invention introduces the high order bits [x] d of x, which is defined in a binary vector set of length n and weight k.
  • the signature algorithm is Algorithm in which the preset is run
  • the steps of the algorithm specifically include:
  • the output probability is the probability
  • the private key used in the algorithm is related to the doctor's attributes rather than his identity, so his identity privacy is protected from disclosure. At the same time, with the use and disclosure of the access structure, identity legitimacy is guaranteed.
  • step S4 the verification step: the user verifies the signature by running a preset verification algorithm after signing.
  • the verification algorithm is Algorithm in which the preset is run
  • the steps of the algorithm specifically include:
  • the verifier if the signature is verified, the attribute of the signer satisfies the policy defined in the access structure, so the verifier considers the signer to be legal. Otherwise the signer's properties may not satisfy the access structure, or a witch attacker may tamper with or falsify the information, so the verifier should reject it.
  • the invention provides a witch attack defense method suitable for a mobile medical social network, and proposes an anonymous authentication protocol, which uses multiple attributes of a user instead of a single identity to access the service. Thereby preventing potential witch attacks and identity privacy leaks, and improving data security.
  • the embodiment of the present invention further provides a witch attack defense system 10, which is applied to a mobile medical social network composed of a key generation center, a cloud service provider, and a user, wherein the system includes:
  • the initialization module 11 is configured to use the key generation center to execute a preset setting algorithm to generate a master key and publish a public parameter pp according to a known security parameter and a global attribute set;
  • the registration module 12 is configured to submit a registration application to the secret key generation center by using the user, and the secret key generation algorithm runs a preset secret key generation algorithm to generate a user private key, and the user is accessed through a secret channel. a private key is distributed to the user;
  • the signing module 13 is configured to: the user signs by running a preset signature algorithm
  • the verification module 14 is configured to verify, by the user, the signature by running a preset verification algorithm after signing.
  • the invention provides a witch attack defense system 10, which is suitable for a mobile medical social network, and proposes an anonymous authentication protocol, which uses multiple attributes of a user instead of a single identity to access services, thereby preventing potential witch attacks and identities. Privacy leaks improve data security.
  • FIG. 2 a schematic structural diagram of a witch attack defense system 10 according to an embodiment of the present invention is shown.
  • the witch attack defense system 10 mainly includes an initialization module 11, a registration module 12, a signature module 13, and a verification module 14.
  • the setting algorithm is a Setup ( ⁇ , U) algorithm
  • the step of running the preset Setup ( ⁇ , U) algorithm specifically includes:
  • the registration module 12 is configured to submit a registration application to the secret key generation center by using the user, and execute a preset key generation algorithm by the key generation center to generate a user private key SK S and pass the secret channel
  • the user private key SK S is distributed to the user.
  • the key generation algorithm is a KeyGen (PP, MSK, S) algorithm
  • the step of running the preset KeyGen (PP, MSK, S) algorithm specifically includes:
  • the user private key SK S (AS i , i ⁇ S ⁇ U * ) is output.
  • the signing module 13 is configured to sign the user by running a preset signature algorithm.
  • the signature algorithm is Algorithm in which the preset is run
  • the steps of the algorithm specifically include:
  • the output probability is the probability
  • the verification module 14 is configured to verify, by the user, the signature by running a preset verification algorithm after signing.
  • the verification algorithm is Algorithm in which the preset is run
  • the steps of the algorithm specifically include:
  • the invention provides a witch attack defense system 10, which is suitable for a mobile medical social network, and proposes an anonymous authentication protocol, which uses multiple attributes of a user instead of a single identity to access services, thereby preventing potential witch attacks and identities. Privacy leaks improve data security.
  • the witch attack defense scheme proposed by the present invention can analyze the efficiency of the defense scheme through simulation.
  • the detailed simulation environment is described as follows: the operating system is Ubuntu 12.04, with Intel(R) Core(TM) i5-3210M quad-core CPU processor, running The speed is 2.50GHz and the memory is 1.6GB.
  • the program of the present invention performs matrix operations using the GMP 6.0.0 large digital library and the NTL 6.0.0 library, and is implemented on the GCC platform through the C++ programming language.
  • the present invention sets the security parameter ⁇ to 128 bit bits and 160 bit bits.
  • Table 1 describes the parameter setting of the defense scheme of the present invention
  • FIG. 3 and FIG. 4 respectively show the running time of the signature algorithm and the verification algorithm of the defense scheme of the present invention.
  • each unit included is only performed according to functional logic.
  • the divisions are not limited to the above-mentioned divisions, as long as the corresponding functions can be implemented; in addition, the specific names of the respective functional units are only for the purpose of facilitating mutual differentiation, and are not intended to limit the scope of protection of the present invention.

Abstract

Provided are a Sybil attack defense method. The method comprises: an initialization step: according to a known security parameter λ and a global attribute set U, using the secret key generation center to operate a pre-set setting algorithm so as to generate a master secret key MSK = {S} and publish a public parameter pp; a registration step: submitting a registration application to the secret key generation center by means of the user, the secret key generation center operating a pre-set secret key generation algorithm to generate a user private key SKS, and distributing the user private key SKS to the user by means of a secret channel; a signature step: the user signing a signature by means of operating a pre-set signature algorithm; and a verification step: the user verifying, after signing a signature, the signature by means of operating a pre-set verification algorithm. Also provided is a Sybil attack defense system. The technical solution provided in the present invention can effectively defend a Sybil attack, so that data security is improved.

Description

一种女巫攻击防御方法及其系统Witch attack defense method and system thereof 技术领域Technical field
本发明涉及网络通信中的数据认证技术领域,尤其涉及一种女巫攻击防御方法及其系统。The present invention relates to the field of data authentication technologies in network communications, and in particular, to a witch attack defense method and system thereof.
背景技术Background technique
近年来,可穿戴智能设备日益普及,云计算发展趋于成熟,移动互联网用户规模逐年增长,大数据价值加速凸显,医疗服务由信息化向移动化、网络化发展,移动医疗网络逐渐形成。其中,可穿戴设备采集居民健康信息,并依托云平台对采集数据进行分析与处理,后提供至医院、医生进行健康监测与临床诊断。移动医疗网络能改善患者的就医体验,提高医生的诊断与治疗效率,降低医疗服务的社会成本,进而有效改善居民健康状况与社会医疗环境。In recent years, wearable smart devices have become increasingly popular, the development of cloud computing has matured, the scale of mobile Internet users has increased year by year, the value of big data has accelerated, medical services have evolved from informationization to mobile and networked, and mobile medical networks have gradually formed. Among them, the wearable device collects the health information of the residents, and analyzes and processes the collected data according to the cloud platform, and then provides the health monitoring and clinical diagnosis to the hospital and the doctor. The mobile medical network can improve the patient's medical experience, improve the diagnosis and treatment efficiency of doctors, reduce the social cost of medical services, and effectively improve the health status of residents and the social medical environment.
移动医疗网络可向用户提供社交网络服务,如转发健康信息、分享健身体验、交流治疗经历等。然而,移动医疗社交网络容易遭受恶意攻击。当一个攻击者伪装成多个合法用户的身份,或者非法声明多个伪造的用户身份时,社交网络遭受到女巫攻击。女巫攻击会降低网络性能、中断程序、篡改数据或恶意欺骗他人,因此会对移动医疗社交网络性能造成巨大的破坏。Mobile medical networks can provide users with social networking services such as forwarding health information, sharing fitness experiences, and communicating treatment experiences. However, mobile medical social networks are vulnerable to malicious attacks. When an attacker pretends to be the identity of multiple legitimate users, or illegally declares multiple forged user identities, the social network is attacked by a witch. Witch attacks can degrade network performance, interrupt programs, tamper with data, or maliciously deceive others, thus causing significant damage to the performance of mobile medical social networks.
在移动医疗健康社交网络中,不可避免的会向公众开放一些健康数据。与 此同时,由于存在的隐私泄露风险,用户不愿意再使用其真实身份互相交流。事实上,任何身份信息泄漏都可能侵犯用户隐私,甚至导致生命和财产损失。身份隐私保护使得防御女巫攻击变得更加困难。In mobile health social networks, it is inevitable to open up some health data to the public. versus At the same time, users are reluctant to use their true identity to communicate with each other due to the risk of privacy breaches. In fact, any disclosure of identity information may infringe on user privacy and even result in loss of life and property. Identity privacy protection makes it more difficult to defend against witch attacks.
发明内容Summary of the invention
有鉴于此,本发明的目的在于提供一种女巫攻击防御方法及其系统,旨在解决现有技术中移动医疗社交网络容易受到女巫攻击的问题。In view of this, the object of the present invention is to provide a witch attack defense method and a system thereof, aiming at solving the problem that the mobile medical social network is vulnerable to witch attacks in the prior art.
本发明提出一种女巫攻击防御方法,应用于由秘钥生成中心、云服务提供商、用户组成的移动医疗社交网络,其中,所述方法包括:The present invention provides a witch attack defense method, which is applied to a mobile medical social network composed of a key generation center, a cloud service provider, and a user, wherein the method includes:
初始化步骤:根据已知安全参数λ和全局属性集U,利用所述秘钥生成中心运行预设的设置算法以生成主密钥MSK={S}并公布公共参数pp;An initialization step: using the secret security generation parameter λ and the global attribute set U, using the key generation center to execute a preset setting algorithm to generate a master key MSK={S} and publishing a public parameter pp;
注册步骤:通过所述用户向所述秘钥生成中心提交注册申请,由所述秘钥生成中心运行预设的秘钥生成算法来生成用户私钥SKS,并通过秘密通道将所述用户私钥SKS分发至所述用户;a registration step: submitting a registration application to the secret key generation center by the user, and executing a preset key generation algorithm by the key generation center to generate a user private key SK S and privately Key SK S is distributed to the user;
签名步骤:所述用户通过运行预设的签名算法进行签名;Signing step: the user signs by running a preset signature algorithm;
验证步骤:所述用户在签名后通过运行预设的验证算法对签名进行验证。Verification step: The user verifies the signature by running a preset verification algorithm after signing.
优选的,在所述初始化步骤中,所述设置算法为Setup(λ,U)算法,其中,运行预设的所述Setup(λ,U)算法的步骤具体包括:Preferably, in the initializing step, the setting algorithm is a Setup (λ, U) algorithm, wherein the step of running the preset Setup (λ, U) algorithm specifically includes:
输入所述安全参数λ和所述全局属性集U={1,2,...,t},并定义缺省属性集U*={t+1,t+2,...,2t}; Entering the security parameter λ and the global attribute set U={1, 2, . . . , t}, and defining a default attribute set U * ={t+1, t+2, . . . , 2t} ;
选择随机矩阵
Figure PCTCN2017084174-appb-000001
Select random matrix
Figure PCTCN2017084174-appb-000001
挑选一个随机矩阵
Figure PCTCN2017084174-appb-000002
使得AS=g mod 2g;
Pick a random matrix
Figure PCTCN2017084174-appb-000002
Let AS=g mod 2g;
定义ζ使得ζ·(g-2)=1 mod 2g;Define ζ such that ζ·(g-2)=1 mod 2g;
计算ζA=(ζa,1)以及ζAS=ζas1+s2=ζg mod 2g;Calculate ζA=(ζa,1) and ζAS=ζas 1 +s 2 =ζg mod 2g;
输出主密钥MSK={S}和公共参数PP={A,ζ,U,U*}。The master key MSK={S} and the public parameter PP={A, ζ, U, U * } are output.
优选的,在所述注册步骤中,所述秘钥生成算法为KeyGen(PP,MSK,S)算法,其中,运行预设的所述KeyGen(PP,MSK,S)算法的步骤具体包括:Preferably, in the step of registering, the key generation algorithm is a KeyGen (PP, MSK, S) algorithm, wherein the step of running the preset KeyGen (PP, MSK, S) algorithm specifically includes:
随机选择t-1次多项式
Figure PCTCN2017084174-appb-000003
使得对于每个j都有fj(0)=sj
Random selection of t-1 polynomial
Figure PCTCN2017084174-appb-000003
So that for each j there is f j (0) = s j ;
对于每个i∈S∪U*,令
Figure PCTCN2017084174-appb-000004
For each i∈S∪U * , order
Figure PCTCN2017084174-appb-000004
输出所述用户私钥SKS=(ASi,i∈S∪U*)。The user private key SK S =(AS i , i∈S∪U * ) is output.
优选的,在所述签名步骤中,所述签名算法为
Figure PCTCN2017084174-appb-000005
算法,其中运行预设的所述
Figure PCTCN2017084174-appb-000006
算法的步骤具体包括:
Preferably, in the signing step, the signature algorithm is
Figure PCTCN2017084174-appb-000005
Algorithm in which the preset is run
Figure PCTCN2017084174-appb-000006
The steps of the algorithm specifically include:
定义一个k元素的属性集
Figure PCTCN2017084174-appb-000007
Define a set of attributes for a k element
Figure PCTCN2017084174-appb-000007
定义缺省属性集
Figure PCTCN2017084174-appb-000008
其中|U′|=t-k;
Define a default attribute set
Figure PCTCN2017084174-appb-000008
Where |U'|=tk;
对于i∈S*∪U′,从标准差为σ的分布
Figure PCTCN2017084174-appb-000009
选择m维向量y1i,y2i,定义Y=(y1i,y2i)t,并计算ui=ζAY=ζ·a·y1i+y2i mod 2g以及
Figure PCTCN2017084174-appb-000010
其中,p=[2q/2d],2g=p·2d+2g mod 2d
For i∈S * ∪U', the distribution from the standard deviation is σ
Figure PCTCN2017084174-appb-000009
Select the m-dimensional vector y 1i , y 2i , define Y = (y 1i , y 2i ) t , and calculate u i = ζ AY = ζ · a · y 1i + y 2i mod 2g and
Figure PCTCN2017084174-appb-000010
Wherein p=[2q/2 d ], 2g=p·2 d +2g mod 2 d ;
当i∈S′∪U′时,计算z1i=A((Δ1f1(i)c+y1i),当i∈S*\S′时,计算z1i=Ay1i,当i∈S′∪U′时,计算z2i=A((Δ2f2(i)c+y2i),当i∈S*\S′时,计算z2i=Ay2iWhen i∈S'∪U', calculate z 1i =A((Δ 1 f 1 (i)c+y 1i ), when i∈S * \S', calculate z 1i =Ay 1i , when i∈ When S'∪U', z 2i = A((Δ 2 f 2 (i)c+y 2i ) is calculated, and when i∈S * \S', z 2i = Ay 2i is calculated;
输出概率为
Figure PCTCN2017084174-appb-000011
The output probability is
Figure PCTCN2017084174-appb-000011
计算
Figure PCTCN2017084174-appb-000012
Calculation
Figure PCTCN2017084174-appb-000012
输出签名
Figure PCTCN2017084174-appb-000013
Output signature
Figure PCTCN2017084174-appb-000013
优选的,在所述验证步骤中,所述验证算法为
Figure PCTCN2017084174-appb-000014
算法,其中运行预设的所述
Figure PCTCN2017084174-appb-000015
算法的步骤具体包括:
Preferably, in the verifying step, the verification algorithm is
Figure PCTCN2017084174-appb-000014
Algorithm in which the preset is run
Figure PCTCN2017084174-appb-000015
The steps of the algorithm specifically include:
输入用户μ的签名
Figure PCTCN2017084174-appb-000016
并定义B使得A mod q=2B;
Enter the signature of the user μ
Figure PCTCN2017084174-appb-000016
And define B such that A mod q=2B;
如果
Figure PCTCN2017084174-appb-000017
则拒绝签名;
in case
Figure PCTCN2017084174-appb-000017
Reject the signature;
如果
Figure PCTCN2017084174-appb-000018
则拒绝签名;
in case
Figure PCTCN2017084174-appb-000018
Reject the signature;
如果
Figure PCTCN2017084174-appb-000019
则接受签名。
in case
Figure PCTCN2017084174-appb-000019
Then accept the signature.
另一方面,本发明还提供一种女巫攻击防御系统,应用于由秘钥生成中心、云服务提供商、用户组成的移动医疗社交网络,其中,所述系统包括:In another aspect, the present invention further provides a witch attack defense system, which is applied to a mobile medical social network composed of a key generation center, a cloud service provider, and a user, wherein the system includes:
初始化模块,用于根据已知安全参数λ和全局属性集U,利用所述秘钥生成中心运行预设的设置算法以生成主密钥MSK={S}并公布公共参数pp;An initialization module, configured to run a preset setting algorithm by using the key generation center according to the known security parameter λ and the global attribute set U to generate a master key MSK={S} and publish a public parameter pp;
注册模块,用于通过所述用户向所述秘钥生成中心提交注册申请,由所述秘钥生成中心运行预设的秘钥生成算法来生成用户私钥SKS,并通过秘密通道将所述用户私钥SKS分发至所述用户;a registration module, configured to submit a registration application to the secret key generation center by using the user, and the secret key generation algorithm runs a preset secret key generation algorithm to generate a user private key SK S and User private key SK S is distributed to the user;
签名模块,用于所述用户通过运行预设的签名算法进行签名;a signature module, configured to: the user signs by running a preset signature algorithm;
验证模块,用于所述用户在签名后通过运行预设的验证算法对签名进行验证。 The verification module is configured to verify the signature of the user by running a preset verification algorithm after signing.
优选的,所述设置算法为Setup(λ,U)算法,其中,运行预设的所述Setup(λ,U)算法的步骤具体包括:Preferably, the setting algorithm is a Setup (λ, U) algorithm, wherein the step of running the preset Setup (λ, U) algorithm specifically includes:
输入所述安全参数λ和所述全局属性集U={1,2,...,t},并定义缺省属性集U*={t+1,t+2,...,2t};Entering the security parameter λ and the global attribute set U={1, 2, . . . , t}, and defining a default attribute set U * ={t+1, t+2, . . . , 2t} ;
选择随机矩阵
Figure PCTCN2017084174-appb-000020
Select random matrix
Figure PCTCN2017084174-appb-000020
挑选一个随机矩阵
Figure PCTCN2017084174-appb-000021
使得AS=g mod 2g;
Pick a random matrix
Figure PCTCN2017084174-appb-000021
Let AS=g mod 2g;
定义ζ使得ζ·(g-2)=1 mod 2g;Define ζ such that ζ·(g-2)=1 mod 2g;
计算ζA=(ζa,1)以及ζAS=ζas1+s2=ζg mod 2g;Calculate ζA=(ζa,1) and ζAS=ζas 1 +s 2 =ζg mod 2g;
输出主密钥MSK={S}和公共参数PP={A,ζ,U,U*}。The master key MSK={S} and the public parameter PP={A, ζ, U, U * } are output.
优选的,所述秘钥生成算法为KeyGen(PP,MSK,S)算法,其中,运行预设的所述KeyGen(PP,MSK,S)算法的步骤具体包括:Preferably, the key generation algorithm is a KeyGen (PP, MSK, S) algorithm, and the step of running the preset KeyGen (PP, MSK, S) algorithm specifically includes:
随机选择t-1次多项式
Figure PCTCN2017084174-appb-000022
使得对于每个j都有fj(0)=sj
Random selection of t-1 polynomial
Figure PCTCN2017084174-appb-000022
So that for each j there is f j (0) = s j ;
对于每个i∈S∪U*,令
Figure PCTCN2017084174-appb-000023
For each i∈S∪U * , order
Figure PCTCN2017084174-appb-000023
输出所述用户私钥SKS=(ASi,i∈S∪U*)。The user private key SK S =(AS i , i∈S∪U * ) is output.
优选的,所述签名算法为
Figure PCTCN2017084174-appb-000024
算法,其中运行预设的所述
Figure PCTCN2017084174-appb-000025
算法的步骤具体包括:
Preferably, the signature algorithm is
Figure PCTCN2017084174-appb-000024
Algorithm in which the preset is run
Figure PCTCN2017084174-appb-000025
The steps of the algorithm specifically include:
定义一个k元素的属性集
Figure PCTCN2017084174-appb-000026
Define a set of attributes for a k element
Figure PCTCN2017084174-appb-000026
定义缺省属性集
Figure PCTCN2017084174-appb-000027
其中|U′|=t-k;
Define a default attribute set
Figure PCTCN2017084174-appb-000027
Where |U'|=tk;
对于i∈S*∪U′,从标准差为σ的分布
Figure PCTCN2017084174-appb-000028
选择m维向量y1i,y2i,定义 Y=(y1i,y2i)t,并计算ui=ζAY=ζ·a·y1i+y2i mod 2g以及
Figure PCTCN2017084174-appb-000029
其中,p=[2q/2d],2g=p·2d+2g mod 2d
For i∈S * ∪U', the distribution from the standard deviation is σ
Figure PCTCN2017084174-appb-000028
Select the m-dimensional vector y 1i , y 2i , define Y=(y 1i , y 2i ) t , and calculate u i =ζAY=ζ·a·y 1i +y 2i mod 2g and
Figure PCTCN2017084174-appb-000029
Wherein p=[2q/2 d ], 2g=p·2 d +2g mod 2 d ;
当i∈S′∪U′时,计算z1i=A((Δ1f1(i)c+y1i),当i∈S*\S′时,计算z1i=Ay1i,当i∈S′∪U′时,计算z2i=A((Δ2f2(i)c+y2i),当i∈S*\S′时,计算z2i=Ay2iWhen i∈S'∪U', calculate z 1i =A((Δ 1 f 1 (i)c+y 1i ), when i∈S * \S', calculate z 1i =Ay 1i , when i∈ When S'∪U', z 2i = A((Δ 2 f 2 (i)c+y 2i ) is calculated, and when i∈S * \S', z 2i = Ay 2i is calculated;
输出概率为
Figure PCTCN2017084174-appb-000030
The output probability is
Figure PCTCN2017084174-appb-000030
计算
Figure PCTCN2017084174-appb-000031
Calculation
Figure PCTCN2017084174-appb-000031
输出签名
Figure PCTCN2017084174-appb-000032
Output signature
Figure PCTCN2017084174-appb-000032
优选的,所述验证算法为
Figure PCTCN2017084174-appb-000033
算法,其中运行预设的所述
Figure PCTCN2017084174-appb-000034
算法的步骤具体包括:
Preferably, the verification algorithm is
Figure PCTCN2017084174-appb-000033
Algorithm in which the preset is run
Figure PCTCN2017084174-appb-000034
The steps of the algorithm specifically include:
输入用户μ的签名
Figure PCTCN2017084174-appb-000035
并定义B使得A mod g=2B;
Enter the signature of the user μ
Figure PCTCN2017084174-appb-000035
And define B such that A mod g=2B;
如果
Figure PCTCN2017084174-appb-000036
则拒绝签名;
in case
Figure PCTCN2017084174-appb-000036
Reject the signature;
如果
Figure PCTCN2017084174-appb-000037
则拒绝签名;
in case
Figure PCTCN2017084174-appb-000037
Reject the signature;
如果
Figure PCTCN2017084174-appb-000038
则接受签名。
in case
Figure PCTCN2017084174-appb-000038
Then accept the signature.
本发明提供的技术方案适用于移动医疗社交网络,提出了一个匿名认证协议,该协议使用用户的多个属性而不是单个身份来访问服务,从而防止潜在的女巫攻击和身份隐私泄漏,提高数据的安全性。The technical solution provided by the present invention is applicable to a mobile medical social network, and an anonymous authentication protocol is proposed, which uses multiple attributes of a user instead of a single identity to access a service, thereby preventing potential witch attacks and identity privacy leakage, and improving data. safety.
附图说明DRAWINGS
图1为本发明一实施方式中女巫攻击防御方法流程图; 1 is a flowchart of a witch attack defense method according to an embodiment of the present invention;
图2为本发明一实施方式中女巫攻击防御系统10的内部结构示意图;2 is a schematic diagram showing the internal structure of a witch attack defense system 10 according to an embodiment of the present invention;
图3为本发明一实施方式中防御方案中的签名算法的运行时间示意图;3 is a schematic diagram of a running time of a signature algorithm in a defense scheme according to an embodiment of the present invention;
图4为本发明一实施方式中防御方案中的验证算法的运行时间示意图。FIG. 4 is a schematic diagram of a running time of a verification algorithm in a defense scheme according to an embodiment of the present invention.
具体实施方式detailed description
为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。The present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It is understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
本发明具体实施方式提供了一种女巫攻击防御方法,应用于由秘钥生成中心、云服务提供商、用户组成的移动医疗社交网络,其中,所述方法包括:A specific embodiment of the present invention provides a witch attack defense method, which is applied to a mobile medical social network composed of a key generation center, a cloud service provider, and a user, wherein the method includes:
初始化步骤:根据已知安全参数λ和全局属性集U,利用所述秘钥生成中心运行预设的设置算法以生成主密钥MSK={S}并公布公共参数pp;An initialization step: using the secret security generation parameter λ and the global attribute set U, using the key generation center to execute a preset setting algorithm to generate a master key MSK={S} and publishing a public parameter pp;
注册步骤:通过所述用户向所述秘钥生成中心提交注册申请,由所述秘钥生成中心运行预设的秘钥生成算法来生成用户私钥SKS,并通过秘密通道将所述用户私钥SKS分发至所述用户;a registration step: submitting a registration application to the secret key generation center by the user, and executing a preset key generation algorithm by the key generation center to generate a user private key SK S and privately Key SK S is distributed to the user;
签名步骤:所述用户通过运行预设的签名算法进行签名;Signing step: the user signs by running a preset signature algorithm;
验证步骤:所述用户在签名后通过运行预设的验证算法对签名进行验证。Verification step: The user verifies the signature by running a preset verification algorithm after signing.
本发明提供的一种女巫攻击防御方法,适用于移动医疗社交网络,提出了一个匿名认证协议,该协议使用用户的多个属性而不是单个身份来访问服务,从而防止潜在的女巫攻击和身份隐私泄漏,提高数据的安全性。 The invention provides a witch attack defense method suitable for a mobile medical social network, and proposes an anonymous authentication protocol, which uses multiple attributes of a user instead of a single identity to access a service, thereby preventing potential witch attacks and identity privacy. Leakage to improve data security.
以下将对本发明所提供的一种女巫攻击防御方法进行详细说明。A witch attack defense method provided by the present invention will be described in detail below.
请参阅图1,为本发明一实施方式中女巫攻击防御方法流程图。Please refer to FIG. 1 , which is a flowchart of a witch attack defense method according to an embodiment of the present invention.
在本实施方式中,该女巫攻击防御方法应用于由秘钥生成中心(Key Generation Center,KGC)、云服务提供商(Cloud Server Provider,CSP)、用户(包括签名者和验证者)组成的移动医疗社交网络,通常,KGC用于设置系统并发出私钥给合法用户,CSP向用户提供医疗健康数据的存储服务,也是潜在的女巫攻击者篡改或伪造用户的健康数据,用户使用某些终端(例如智能手机,笔记本电脑等)和应用来定期访问社交平台,签名者是指想要分享存储在CSP中的健康数据的用户,验证者是指与签名者有社交关系的用户。In this embodiment, the witch attack defense method is applied to a mobile phone composed of a Key Generation Center (KGC), a Cloud Service Provider (CSP), and a user (including a signer and a verifier). Medical social network, usually, KGC is used to set up the system and issue private keys to legitimate users. CSP provides users with medical health data storage services. It is also a potential witch attacker to tamper with or falsify users' health data. Users use certain terminals ( For example, smartphones, laptops, etc.) and applications to periodically access the social platform, the signer refers to the user who wants to share the health data stored in the CSP, and the verifier refers to the user who has a social relationship with the signer.
在步骤S1中,初始化步骤:根据已知安全参数λ和全局属性集U,利用所述秘钥生成中心运行预设的设置算法以生成主密钥MSK={S}并公布公共参数pp。在本实施方式中,初始化步骤用于建立注册系统。In step S1, an initialization step is to run a preset setting algorithm using the secret key generation center to generate a master key MSK={S} and publish a common parameter pp according to the known security parameter λ and the global attribute set U. In the present embodiment, the initialization step is used to establish a registration system.
在本实施方式中,在所述初始化步骤中,所述设置算法为Setup(λ,U)算法,其中,运行预设的所述Setup(λ,U)算法的步骤具体包括:In this embodiment, in the initializing step, the setting algorithm is a Setup (λ, U) algorithm, wherein the step of running the preset Setup (λ, U) algorithm specifically includes:
输入所述安全参数λ和所述全局属性集U={1,2,...,t},并定义缺省属性集U*={t+1,t+2,...,2t};Entering the security parameter λ and the global attribute set U={1, 2, . . . , t}, and defining a default attribute set U * ={t+1, t+2, . . . , 2t} ;
选择随机矩阵
Figure PCTCN2017084174-appb-000039
Select random matrix
Figure PCTCN2017084174-appb-000039
挑选一个随机矩阵
Figure PCTCN2017084174-appb-000040
使得AS=g mod 2g;
Pick a random matrix
Figure PCTCN2017084174-appb-000040
Let AS=g mod 2g;
定义ζ使得ζ·(g-2)=1 mod 2g; Define ζ such that ζ·(g-2)=1 mod 2g;
计算ζA=(ζa,1)以及ζAS=ζas1+s2=ζg mod 2g;Calculate ζA=(ζa,1) and ζAS=ζas 1 +s 2 =ζg mod 2g;
输出主密钥MSK={S}和公共参数PP={A,ζ,U,U*}。The master key MSK={S} and the public parameter PP={A, ζ, U, U * } are output.
在步骤S2中,注册步骤:通过所述用户向所述秘钥生成中心提交注册申请,由所述秘钥生成中心运行预设的秘钥生成算法来生成用户私钥SKS,并通过秘密通道将所述用户私钥SKS分发至所述用户。In step S2, the registration step is: submitting a registration application to the secret key generation center by the user, and executing a preset key generation algorithm by the key generation center to generate a user private key SK S and passing the secret channel Distributing the user private key SK S to the user.
在本实施方式中,如果一个具有属性集S的合法用户(如病人或医生)想访问社交平台,则必须执行此操作。In the present embodiment, if a legitimate user (such as a patient or doctor) having the attribute set S wants to access the social platform, this operation must be performed.
在本实施方式中,在所述注册步骤中,所述秘钥生成算法为KeyGen(PP,MSK,S)算法,其中,运行预设的所述KeyGen(PP,MSK,S)算法的步骤具体包括:In this embodiment, in the registration step, the key generation algorithm is a KeyGen (PP, MSK, S) algorithm, wherein the step of executing the preset KeyGen (PP, MSK, S) algorithm is specific include:
随机选择t-1次多项式
Figure PCTCN2017084174-appb-000041
使得对于每个j都有fj(0)=sj
Random selection of t-1 polynomial
Figure PCTCN2017084174-appb-000041
So that for each j there is f j (0) = s j ;
对于每个i∈S∪U*,令
Figure PCTCN2017084174-appb-000042
For each i∈S∪U * , order
Figure PCTCN2017084174-appb-000042
输出所述用户私钥SKS=(ASi,i∈S∪U*)。The user private key SK S =(AS i , i∈S∪U * ) is output.
在步骤S3中,签名步骤:所述用户通过运行预设的签名算法进行签名。In step S3, a signature step: the user signs by running a preset signature algorithm.
在本实施方式中,假设医生具有属性集S的私钥SKS,例如“医院A,儿科,主任医师”,为了防御女巫攻击和保护身份隐私,医生运行
Figure PCTCN2017084174-appb-000043
算法来证明他是一个有效的用户。在本实施方式中,设d是我们想要在
Figure PCTCN2017084174-appb-000044
中降低的位数,为了减少签名的长度,本发明引入x的高阶位[x]d,本发明定义在长度为n和权重为k的二进制向量集合
Figure PCTCN2017084174-appb-000045
上具有均匀输出的哈希函数H,为了证明签 名者在属性集S*中至少拥有k个属性,签名者执行
Figure PCTCN2017084174-appb-000046
算法。
In the present embodiment, it is assumed that the doctor has the private key SK S of the attribute set S, such as "Hospital A, Pediatrics, Chief Physician", in order to defend against witch attacks and protect identity privacy, the doctor runs
Figure PCTCN2017084174-appb-000043
Algorithm to prove that he is a valid user. In this embodiment, let d be that we want to
Figure PCTCN2017084174-appb-000044
In order to reduce the length of the signature, the present invention introduces the high order bits [x] d of x, which is defined in a binary vector set of length n and weight k.
Figure PCTCN2017084174-appb-000045
A hash function H with a uniform output, in order to prove that the signer has at least k attributes in the attribute set S * , the signer performs
Figure PCTCN2017084174-appb-000046
algorithm.
在本实施方式中,在所述签名步骤中,所述签名算法为
Figure PCTCN2017084174-appb-000047
算法,其中运行预设的所述
Figure PCTCN2017084174-appb-000048
算法的步骤具体包括:
In this embodiment, in the signing step, the signature algorithm is
Figure PCTCN2017084174-appb-000047
Algorithm in which the preset is run
Figure PCTCN2017084174-appb-000048
The steps of the algorithm specifically include:
定义一个k元素的属性集
Figure PCTCN2017084174-appb-000049
Define a set of attributes for a k element
Figure PCTCN2017084174-appb-000049
定义缺省属性集
Figure PCTCN2017084174-appb-000050
其中|U′|=t-k;
Define a default attribute set
Figure PCTCN2017084174-appb-000050
Where |U'|=tk;
对于i∈S*∪U′,从标准差为σ的分布
Figure PCTCN2017084174-appb-000051
选择m维向量y1i,y2i,定义Y=(y1i,y2i)t,并计算ui=ζAY=ζ·a·y1i+y2imod 2g以及
Figure PCTCN2017084174-appb-000052
其中,p=[2q/2d],2g=p·2d+2g mod 2d
For i∈S * ∪U', the distribution from the standard deviation is σ
Figure PCTCN2017084174-appb-000051
Select the m-dimensional vector y 1i , y 2i , define Y = (y 1i , y 2i ) t , and calculate u i = ζ AY = ζ · a · y 1i + y 2i mod 2g and
Figure PCTCN2017084174-appb-000052
Wherein p=[2q/2 d ], 2g=p·2 d +2g mod 2 d ;
当i∈S′∪U′时,计算z1i=A((Δ1f1(i)c+y1i),当i∈S*\S′时,计算z1i=Ay1i,当i∈S′∪U′时,计算z2i=A((Δ2f2(i)c+y2i),当i∈S*\S′时,计算z2i=Ay2iWhen i∈S'∪U', calculate z 1i =A((Δ 1 f 1 (i)c+y 1i ), when i∈S * \S', calculate z 1i =Ay 1i , when i∈ When S'∪U', z 2i = A((Δ 2 f 2 (i)c+y 2i ) is calculated, and when i∈S * \S', z 2i = Ay 2i is calculated;
输出概率为
Figure PCTCN2017084174-appb-000053
The output probability is
Figure PCTCN2017084174-appb-000053
计算
Figure PCTCN2017084174-appb-000054
Calculation
Figure PCTCN2017084174-appb-000054
输出签名
Figure PCTCN2017084174-appb-000055
Output signature
Figure PCTCN2017084174-appb-000055
在本实施方式中,
Figure PCTCN2017084174-appb-000056
算法中使用的私钥与医生的属性而不是他的身份有关,所以他的身份隐私被保护免于泄漏。同时,随着访问结构的使用和公开,身份合法性得到保证。
In the present embodiment,
Figure PCTCN2017084174-appb-000056
The private key used in the algorithm is related to the doctor's attributes rather than his identity, so his identity privacy is protected from disclosure. At the same time, with the use and disclosure of the access structure, identity legitimacy is guaranteed.
在步骤S4中,验证步骤:所述用户在签名后通过运行预设的验证算法对签名进行验证。In step S4, the verification step: the user verifies the signature by running a preset verification algorithm after signing.
在本实施方式中,在所述验证步骤中,所述验证算法为
Figure PCTCN2017084174-appb-000057
算法,其中运行预设的所述
Figure PCTCN2017084174-appb-000058
算法的步骤具体包括:
In this embodiment, in the verifying step, the verification algorithm is
Figure PCTCN2017084174-appb-000057
Algorithm in which the preset is run
Figure PCTCN2017084174-appb-000058
The steps of the algorithm specifically include:
输入用户μ的签名
Figure PCTCN2017084174-appb-000059
并定义B使得A mod q=2B;
Enter the signature of the user μ
Figure PCTCN2017084174-appb-000059
And define B such that A mod q=2B;
如果
Figure PCTCN2017084174-appb-000060
则拒绝签名;
in case
Figure PCTCN2017084174-appb-000060
Reject the signature;
如果
Figure PCTCN2017084174-appb-000061
则拒绝签名;
in case
Figure PCTCN2017084174-appb-000061
Reject the signature;
如果
Figure PCTCN2017084174-appb-000062
则接受签名。
in case
Figure PCTCN2017084174-appb-000062
Then accept the signature.
在本实施方式中,如签名通过验证,签名者的属性满足访问结构中定义的策略,所以验证者认为签名者是合法的。否则签名者的属性可能不能满足访问结构,或者有女巫攻击者篡改或伪造信息,所以验证者应该拒绝它。In the present embodiment, if the signature is verified, the attribute of the signer satisfies the policy defined in the access structure, so the verifier considers the signer to be legal. Otherwise the signer's properties may not satisfy the access structure, or a witch attacker may tamper with or falsify the information, so the verifier should reject it.
在本实施方式中,签名的正确性验证描述如下:In this embodiment, the verification of the correctness of the signature is described as follows:
Figure PCTCN2017084174-appb-000063
Figure PCTCN2017084174-appb-000063
因此,therefore,
Figure PCTCN2017084174-appb-000064
Figure PCTCN2017084174-appb-000064
本发明提供的一种女巫攻击防御方法,适用于移动医疗社交网络,提出了一个匿名认证协议,该协议使用用户的多个属性而不是单个身份来访问服务, 从而防止潜在的女巫攻击和身份隐私泄漏,提高数据的安全性。The invention provides a witch attack defense method suitable for a mobile medical social network, and proposes an anonymous authentication protocol, which uses multiple attributes of a user instead of a single identity to access the service. Thereby preventing potential witch attacks and identity privacy leaks, and improving data security.
本发明具体实施方式还提供一种女巫攻击防御系统10,应用于由秘钥生成中心、云服务提供商、用户组成的移动医疗社交网络,其中,所述系统包括:The embodiment of the present invention further provides a witch attack defense system 10, which is applied to a mobile medical social network composed of a key generation center, a cloud service provider, and a user, wherein the system includes:
初始化模块11,用于根据已知安全参数和全局属性集,利用所述秘钥生成中心运行预设的设置算法以生成主密钥并公布公共参数pp;The initialization module 11 is configured to use the key generation center to execute a preset setting algorithm to generate a master key and publish a public parameter pp according to a known security parameter and a global attribute set;
注册模块12,用于通过所述用户向所述秘钥生成中心提交注册申请,由所述秘钥生成中心运行预设的秘钥生成算法来生成用户私钥,并通过秘密通道将所述用户私钥分发至所述用户;The registration module 12 is configured to submit a registration application to the secret key generation center by using the user, and the secret key generation algorithm runs a preset secret key generation algorithm to generate a user private key, and the user is accessed through a secret channel. a private key is distributed to the user;
签名模块13,用于所述用户通过运行预设的签名算法进行签名;The signing module 13 is configured to: the user signs by running a preset signature algorithm;
验证模块14,用于所述用户在签名后通过运行预设的验证算法对签名进行验证。The verification module 14 is configured to verify, by the user, the signature by running a preset verification algorithm after signing.
本发明提供的一种女巫攻击防御系统10,适用于移动医疗社交网络,提出了一个匿名认证协议,该协议使用用户的多个属性而不是单个身份来访问服务,从而防止潜在的女巫攻击和身份隐私泄漏,提高数据的安全性。The invention provides a witch attack defense system 10, which is suitable for a mobile medical social network, and proposes an anonymous authentication protocol, which uses multiple attributes of a user instead of a single identity to access services, thereby preventing potential witch attacks and identities. Privacy leaks improve data security.
请参阅图2,所示为本发明一实施方式中女巫攻击防御系统10的结构示意图。Referring to FIG. 2, a schematic structural diagram of a witch attack defense system 10 according to an embodiment of the present invention is shown.
在本实施方式中,女巫攻击防御系统10,主要包括初始化模块11、注册模块12、签名模块13和验证模块14。In the present embodiment, the witch attack defense system 10 mainly includes an initialization module 11, a registration module 12, a signature module 13, and a verification module 14.
初始化模块11,用于根据已知安全参数λ和全局属性集U,利用所述秘钥 生成中心运行预设的设置算法以生成主密钥MSK={S}并公布公共参数pp。An initialization module 11 for utilizing the secret key according to a known security parameter λ and a global attribute set U The generation center runs the preset setting algorithm to generate the master key MSK={S} and publishes the public parameter pp.
在本实施方式中,所述设置算法为Setup(λ,U)算法,其中,运行预设的所述Setup(λ,U)算法的步骤具体包括:In this embodiment, the setting algorithm is a Setup (λ, U) algorithm, and the step of running the preset Setup (λ, U) algorithm specifically includes:
输入所述安全参数λ和所述全局属性集U={1,2,...,t},并定义缺省属性集U*={t+1,t+2,...,2t};Entering the security parameter λ and the global attribute set U={1, 2, . . . , t}, and defining a default attribute set U * ={t+1, t+2, . . . , 2t} ;
选择随机矩阵
Figure PCTCN2017084174-appb-000065
Select random matrix
Figure PCTCN2017084174-appb-000065
挑选一个随机矩阵
Figure PCTCN2017084174-appb-000066
使得AS=g mod 2g;
Pick a random matrix
Figure PCTCN2017084174-appb-000066
Let AS=g mod 2g;
定义ζ使得ζ·(g-2)=1 mod 2g;Define ζ such that ζ·(g-2)=1 mod 2g;
计算ζA=(ζa,1)以及ζAS=ζas1+s2=ζg mod 2g;Calculate ζA=(ζa,1) and ζAS=ζas 1 +s 2 =ζg mod 2g;
输出主密钥MSK={S}和公共参数PP={A,ζ,U,U*}。The master key MSK={S} and the public parameter PP={A, ζ, U, U * } are output.
注册模块12,用于通过所述用户向所述秘钥生成中心提交注册申请,由所述秘钥生成中心运行预设的秘钥生成算法来生成用户私钥SKS,并通过秘密通道将所述用户私钥SKS分发至所述用户。The registration module 12 is configured to submit a registration application to the secret key generation center by using the user, and execute a preset key generation algorithm by the key generation center to generate a user private key SK S and pass the secret channel The user private key SK S is distributed to the user.
在本实施方式中,所述秘钥生成算法为KeyGen(PP,MSK,S)算法,其中,运行预设的所述KeyGen(PP,MSK,S)算法的步骤具体包括:In this embodiment, the key generation algorithm is a KeyGen (PP, MSK, S) algorithm, and the step of running the preset KeyGen (PP, MSK, S) algorithm specifically includes:
随机选择t-1次多项式
Figure PCTCN2017084174-appb-000067
使得对于每个j都有fj(0)=sj
Random selection of t-1 polynomial
Figure PCTCN2017084174-appb-000067
So that for each j there is f j (0) = s j ;
对于每个i∈S∪U*,令
Figure PCTCN2017084174-appb-000068
For each i∈S∪U * , order
Figure PCTCN2017084174-appb-000068
输出所述用户私钥SKS=(ASi,i∈S∪U*)。The user private key SK S =(AS i , i∈S∪U * ) is output.
签名模块13,用于所述用户通过运行预设的签名算法进行签名。 The signing module 13 is configured to sign the user by running a preset signature algorithm.
在本实施方式中,所述签名算法为
Figure PCTCN2017084174-appb-000069
算法,其中运行预设的所述
Figure PCTCN2017084174-appb-000070
算法的步骤具体包括:
In this embodiment, the signature algorithm is
Figure PCTCN2017084174-appb-000069
Algorithm in which the preset is run
Figure PCTCN2017084174-appb-000070
The steps of the algorithm specifically include:
定义一个k元素的属性集
Figure PCTCN2017084174-appb-000071
Define a set of attributes for a k element
Figure PCTCN2017084174-appb-000071
定义缺省属性集
Figure PCTCN2017084174-appb-000072
其中|U′|=t-k;
Define a default attribute set
Figure PCTCN2017084174-appb-000072
Where |U'|=tk;
对于i∈S*∪U′,从标准差为σ的分布
Figure PCTCN2017084174-appb-000073
选择m维向量y1i,y2i,定义Y=(y1i,y2i)t,并计算ui=ζAY=ζ·a·y1i+y2imod 2g以及
Figure PCTCN2017084174-appb-000074
其中,p=[2q/2d],2g=p·2d+2g mod 2d
For i∈S * ∪U', the distribution from the standard deviation is σ
Figure PCTCN2017084174-appb-000073
Select the m-dimensional vector y 1i , y 2i , define Y = (y 1i , y 2i ) t , and calculate u i = ζ AY = ζ · a · y 1i + y 2i mod 2g and
Figure PCTCN2017084174-appb-000074
Wherein p=[2q/2 d ], 2g=p·2 d +2g mod 2 d ;
当i∈S′∪U′时,计算z1i=A((Δ1f1(i)c+y1i),当i∈S*\S′时,计算z1i=Ay1i,当i∈S′∪U′时,计算z2i=A((Δ2f2(i)c+y2i),当i∈S*\S′时,计算z2i=Ay2iWhen i∈S'∪U', calculate z 1i =A((Δ 1 f 1 (i)c+y 1i ), when i∈S * \S', calculate z 1i =Ay 1i , when i∈ When S'∪U', z 2i = A((Δ 2 f 2 (i)c+y 2i ) is calculated, and when i∈S * \S', z 2i = Ay 2i is calculated;
输出概率为
Figure PCTCN2017084174-appb-000075
The output probability is
Figure PCTCN2017084174-appb-000075
计算
Figure PCTCN2017084174-appb-000076
Calculation
Figure PCTCN2017084174-appb-000076
输出签名
Figure PCTCN2017084174-appb-000077
Output signature
Figure PCTCN2017084174-appb-000077
验证模块14,用于所述用户在签名后通过运行预设的验证算法对签名进行验证。The verification module 14 is configured to verify, by the user, the signature by running a preset verification algorithm after signing.
在本实施方式中,所述验证算法为
Figure PCTCN2017084174-appb-000078
算法,其中运行预设的所述
Figure PCTCN2017084174-appb-000079
算法的步骤具体包括:
In this embodiment, the verification algorithm is
Figure PCTCN2017084174-appb-000078
Algorithm in which the preset is run
Figure PCTCN2017084174-appb-000079
The steps of the algorithm specifically include:
输入用户μ的签名
Figure PCTCN2017084174-appb-000080
并定义B使得A mod g=2B;
Enter the signature of the user μ
Figure PCTCN2017084174-appb-000080
And define B such that A mod g=2B;
如果
Figure PCTCN2017084174-appb-000081
则拒绝签名;
in case
Figure PCTCN2017084174-appb-000081
Reject the signature;
如果
Figure PCTCN2017084174-appb-000082
则拒绝签名;
in case
Figure PCTCN2017084174-appb-000082
Reject the signature;
如果
Figure PCTCN2017084174-appb-000083
则接受签名。
in case
Figure PCTCN2017084174-appb-000083
Then accept the signature.
本发明提供的一种女巫攻击防御系统10,适用于移动医疗社交网络,提出了一个匿名认证协议,该协议使用用户的多个属性而不是单个身份来访问服务,从而防止潜在的女巫攻击和身份隐私泄漏,提高数据的安全性。The invention provides a witch attack defense system 10, which is suitable for a mobile medical social network, and proposes an anonymous authentication protocol, which uses multiple attributes of a user instead of a single identity to access services, thereby preventing potential witch attacks and identities. Privacy leaks improve data security.
本发明提出的女巫攻击防御方案,可以通过仿真分析防御方案的效率,详细的仿真环境描述如下:操作系统是Ubuntu 12.04,具有英特尔(R)Core(TM)i5-3210M四核CPU处理器,运行速度为2.50GHz,内存为1.6GB。本发明的程序使用GMP 6.0.0大数字库和NTL 6.0.0库进行矩阵运算,通过C++编程语言在GCC平台上实现。为方便起见,本发明将安全参数λ设置为128位比特和160位比特。实验中使用的属性数量为l={3,5,8}。每个测试有100次迭代并取其平均值。The witch attack defense scheme proposed by the present invention can analyze the efficiency of the defense scheme through simulation. The detailed simulation environment is described as follows: the operating system is Ubuntu 12.04, with Intel(R) Core(TM) i5-3210M quad-core CPU processor, running The speed is 2.50GHz and the memory is 1.6GB. The program of the present invention performs matrix operations using the GMP 6.0.0 large digital library and the NTL 6.0.0 library, and is implemented on the GCC platform through the C++ programming language. For convenience, the present invention sets the security parameter λ to 128 bit bits and 160 bit bits. The number of attributes used in the experiment is l={3,5,8}. Each test has 100 iterations and averages.
其中,表1描述了本发明防御方案的参数设置情况,图3和图4分别显示了本发明防御方案的签名算法和验证算法的运行时间。Among them, Table 1 describes the parameter setting of the defense scheme of the present invention, and FIG. 3 and FIG. 4 respectively show the running time of the signature algorithm and the verification algorithm of the defense scheme of the present invention.
表1 本发明防御方案参数设置Table 1 Parameter settings of the defense scheme of the present invention
Figure PCTCN2017084174-appb-000084
Figure PCTCN2017084174-appb-000084
值得注意的是,上述实施例中,所包括的各个单元只是按照功能逻辑进行 划分的,但并不局限于上述的划分,只要能够实现相应的功能即可;另外,各功能单元的具体名称也只是为了便于相互区分,并不用于限制本发明的保护范围。It should be noted that, in the above embodiment, each unit included is only performed according to functional logic. The divisions are not limited to the above-mentioned divisions, as long as the corresponding functions can be implemented; in addition, the specific names of the respective functional units are only for the purpose of facilitating mutual differentiation, and are not intended to limit the scope of protection of the present invention.
另外,本领域普通技术人员可以理解实现上述各实施例方法中的全部或部分步骤是可以通过程序来指令相关的硬件来完成,相应的程序可以存储于一计算机可读取存储介质中,所述的存储介质,如ROM/RAM、磁盘或光盘等。In addition, those skilled in the art can understand that all or part of the steps of implementing the above embodiments may be completed by a program to instruct related hardware, and the corresponding program may be stored in a computer readable storage medium. Storage medium, such as ROM/RAM, disk or CD.
以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内所作的任何修改、等同替换和改进等,均应包含在本发明的保护范围之内。 The above is only the preferred embodiment of the present invention, and is not intended to limit the present invention. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present invention should be included in the protection of the present invention. Within the scope.

Claims (10)

  1. 一种女巫攻击防御方法,应用于由秘钥生成中心、云服务提供商、用户组成的移动医疗社交网络,其特征在于,所述方法包括:A witch attack defense method is applied to a mobile medical social network composed of a key generation center, a cloud service provider, and a user, wherein the method includes:
    初始化步骤:根据已知安全参数λ和全局属性集U,利用所述秘钥生成中心运行预设的设置算法以生成主密钥MSK={S}并公布公共参数pp;An initialization step: using the secret security generation parameter λ and the global attribute set U, using the key generation center to execute a preset setting algorithm to generate a master key MSK={S} and publishing a public parameter pp;
    注册步骤:通过所述用户向所述秘钥生成中心提交注册申请,由所述秘钥生成中心运行预设的秘钥生成算法来生成用户私钥SKS,并通过秘密通道将所述用户私钥SKS分发至所述用户;a registration step: submitting a registration application to the secret key generation center by the user, and executing a preset key generation algorithm by the key generation center to generate a user private key SK S and privately Key SK S is distributed to the user;
    签名步骤:所述用户通过运行预设的签名算法进行签名;Signing step: the user signs by running a preset signature algorithm;
    验证步骤:所述用户在签名后通过运行预设的验证算法对签名进行验证。Verification step: The user verifies the signature by running a preset verification algorithm after signing.
  2. 如权利要求1所述的女巫攻击防御方法,其特征在于,在所述初始化步骤中,所述设置算法为Setup(λ,U)算法,其中,运行预设的所述Setup(λ,U)算法的步骤具体包括:The witch attack defense method according to claim 1, wherein in the initializing step, the setting algorithm is a Setup (λ, U) algorithm, wherein the preset set (λ, U) is executed. The steps of the algorithm specifically include:
    输入所述安全参数λ和所述全局属性集U={1,2,...,t},并定义缺省属性集U*={t+1,t+2,...,2t};Entering the security parameter λ and the global attribute set U={1, 2, . . . , t}, and defining a default attribute set U * ={t+1, t+2, . . . , 2t} ;
    选择随机矩阵
    Figure PCTCN2017084174-appb-100001
    Select random matrix
    Figure PCTCN2017084174-appb-100001
    挑选一个随机矩阵
    Figure PCTCN2017084174-appb-100002
    使得AS=q mod 2q;
    Pick a random matrix
    Figure PCTCN2017084174-appb-100002
    Let AS=q mod 2q;
    定义ζ使得ζ·(q-2)=1 mod 2q;Define ζ such that ζ·(q-2)=1 mod 2q;
    计算ζA=(ζa,1)以及ζAS=ζas1+s2=ζq mod 2q; Calculate ζA=(ζa,1) and ζAS=ζas 1 +s 2 =ζq mod 2q;
    输出主密钥MSK={S}和公共参数PP={A,ζ,U,U*}。The master key MSK={S} and the public parameter PP={A, ζ, U, U * } are output.
  3. 如权利要求2所述的女巫攻击防御方法,其特征在于,在所述注册步骤中,所述秘钥生成算法为KeyGen(PP,MSK,S)算法,其中,运行预设的所述KeyGen(PP,MSK,S)算法的步骤具体包括:The witch attack defense method according to claim 2, wherein in the registering step, the key generation algorithm is a KeyGen (PP, MSK, S) algorithm, wherein the preset KeyGen is executed ( The steps of the PP, MSK, S) algorithm specifically include:
    随机选择t-1次多项式
    Figure PCTCN2017084174-appb-100003
    使得对于每个j都有fj(0)=sj
    Random selection of t-1 polynomial
    Figure PCTCN2017084174-appb-100003
    So that for each j there is f j (0) = s j ;
    对于每个i∈S∪U*,令
    Figure PCTCN2017084174-appb-100004
    For each i∈S∪U * , order
    Figure PCTCN2017084174-appb-100004
    输出所述用户私钥SKS=(ASi,i∈S∪U*)。The user private key SK S =(AS i , i∈S∪U * ) is output.
  4. 如权利要求3所述的女巫攻击防御方法,其特征在于,在所述签名步骤中,所述签名算法为
    Figure PCTCN2017084174-appb-100005
    算法,其中运行预设的所述
    Figure PCTCN2017084174-appb-100006
    算法的步骤具体包括:
    The witch attack defense method according to claim 3, wherein in the signing step, the signature algorithm is
    Figure PCTCN2017084174-appb-100005
    Algorithm in which the preset is run
    Figure PCTCN2017084174-appb-100006
    The steps of the algorithm specifically include:
    定义一个k元素的属性集
    Figure PCTCN2017084174-appb-100007
    Define a set of attributes for a k element
    Figure PCTCN2017084174-appb-100007
    定义缺省属性集
    Figure PCTCN2017084174-appb-100008
    其中|U′|=t-k;
    Define a default attribute set
    Figure PCTCN2017084174-appb-100008
    Where |U'|=tk;
    对于i∈S*∪U′,从标准差为σ的分布
    Figure PCTCN2017084174-appb-100009
    选择m维向量y1i,y2i,定义Y=(y1i,y2i)t,并计算ui=ζAY=ζ·a·y1i+y2imod 2q以及
    Figure PCTCN2017084174-appb-100010
    其中,p=[2q/2d],2q=p·2d+2q mod 2d
    For i∈S * ∪U', the distribution from the standard deviation is σ
    Figure PCTCN2017084174-appb-100009
    Select the m-dimensional vector y 1i , y 2i , define Y = (y 1i , y 2i ) t , and calculate u i = ζ AY = ζ · a · y 1i + y 2i mod 2q and
    Figure PCTCN2017084174-appb-100010
    Where p=[2q/2 d ], 2q=p·2 d +2q mod 2 d ;
    当i∈S′∪U′时,计算z1i=A((Δ1f1(i)c+y1i),当i∈S*\S′时,计算z1i=Ay1i,当i∈S′∪U′时,计算z2i=A((Δ2f2(i)c+y2i),当i∈S*\S′时,计算z2i=Ay2iWhen i∈S'∪U', calculate z 1i =A((Δ 1 f 1 (i)c+y 1i ), when i∈S * \S', calculate z 1i =Ay 1i , when i∈ When S'∪U', z 2i = A((Δ 2 f 2 (i)c+y 2i ) is calculated, and when i∈S * \S', z 2i = Ay 2i is calculated;
    输出概率为
    Figure PCTCN2017084174-appb-100011
    The output probability is
    Figure PCTCN2017084174-appb-100011
    计算
    Figure PCTCN2017084174-appb-100012
    Calculation
    Figure PCTCN2017084174-appb-100012
    输出签名
    Figure PCTCN2017084174-appb-100013
    Output signature
    Figure PCTCN2017084174-appb-100013
  5. 如权利要求4所述的女巫攻击防御方法,其特征在于,在所述验证步骤中,所述验证算法为
    Figure PCTCN2017084174-appb-100014
    算法,其中运行预设的所述
    Figure PCTCN2017084174-appb-100015
    算法的步骤具体包括:
    The witch attack defense method according to claim 4, wherein in the verifying step, the verification algorithm is
    Figure PCTCN2017084174-appb-100014
    Algorithm in which the preset is run
    Figure PCTCN2017084174-appb-100015
    The steps of the algorithm specifically include:
    输入用户μ的签名
    Figure PCTCN2017084174-appb-100016
    并定义B使得A mod q=2B;
    Enter the signature of the user μ
    Figure PCTCN2017084174-appb-100016
    And define B such that A mod q=2B;
    如果
    Figure PCTCN2017084174-appb-100017
    则拒绝签名;
    in case
    Figure PCTCN2017084174-appb-100017
    Reject the signature;
    如果
    Figure PCTCN2017084174-appb-100018
    则拒绝签名;
    in case
    Figure PCTCN2017084174-appb-100018
    Reject the signature;
    如果
    Figure PCTCN2017084174-appb-100019
    则接受签名。
    in case
    Figure PCTCN2017084174-appb-100019
    Then accept the signature.
  6. 一种女巫攻击防御系统,应用于由秘钥生成中心、云服务提供商、用户组成的移动医疗社交网络,其特征在于,所述系统包括:A witch attack defense system is applied to a mobile medical social network composed of a key generation center, a cloud service provider, and a user, wherein the system includes:
    初始化模块,用于根据已知安全参数λ和全局属性集U,利用所述秘钥生成中心运行预设的设置算法以生成主密钥MSK={S}并公布公共参数pp;An initialization module, configured to run a preset setting algorithm by using the key generation center according to the known security parameter λ and the global attribute set U to generate a master key MSK={S} and publish a public parameter pp;
    注册模块,用于通过所述用户向所述秘钥生成中心提交注册申请,由所述秘钥生成中心运行预设的秘钥生成算法来生成用户私钥SKS,并通过秘密通道将所述用户私钥SKS分发至所述用户;a registration module, configured to submit a registration application to the secret key generation center by using the user, and the secret key generation algorithm runs a preset secret key generation algorithm to generate a user private key SK S and User private key SK S is distributed to the user;
    签名模块,用于所述用户通过运行预设的签名算法进行签名;a signature module, configured to: the user signs by running a preset signature algorithm;
    验证模块,用于所述用户在签名后通过运行预设的验证算法对签名进行验证。The verification module is configured to verify the signature of the user by running a preset verification algorithm after signing.
  7. 如权利要求6所述的女巫攻击防御系统,其特征在于,所述设置算法为 Setup(λ,U)算法,其中,运行预设的所述Setup(λ,U)算法的步骤具体包括:The witch attack defense system according to claim 6, wherein said setting algorithm is The Setup (λ, U) algorithm, wherein the step of running the preset Setup (λ, U) algorithm specifically includes:
    输入所述安全参数λ和所述全局属性集U={1,2,...,t},并定义缺省属性集U*={t+1,t+2,...,2t};Entering the security parameter λ and the global attribute set U={1, 2, . . . , t}, and defining a default attribute set U * ={t+1, t+2, . . . , 2t} ;
    选择随机矩阵
    Figure PCTCN2017084174-appb-100020
    Select random matrix
    Figure PCTCN2017084174-appb-100020
    挑选一个随机矩阵使得AS=q mod 2q;Pick a random matrix Let AS=q mod 2q;
    定义ζ使得ζ·(q-2)=1 mod 2q;Define ζ such that ζ·(q-2)=1 mod 2q;
    计算ζA=(ζa,1)以及ζAS=ζas1+s2=ζq mod 2q;Calculate ζA=(ζa,1) and ζAS=ζas 1 +s 2 =ζq mod 2q;
    输出主密钥MSK={S}和公共参数PP={A,ζ,U,U*}。The master key MSK={S} and the public parameter PP={A, ζ, U, U * } are output.
  8. 如权利要求7所述的女巫攻击防御系统,其特征在于,所述秘钥生成算法为KeyGen(PP,MSK,S)算法,其中,运行预设的所述KeyGen(PP,MSK,S)算法的步骤具体包括:The witch attack defense system according to claim 7, wherein the key generation algorithm is a KeyGen (PP, MSK, S) algorithm, wherein the preset KeyGen (PP, MSK, S) algorithm is executed. The steps specifically include:
    随机选择t-1次多项式
    Figure PCTCN2017084174-appb-100022
    使得对于每个j都有fj(0)=sj
    Random selection of t-1 polynomial
    Figure PCTCN2017084174-appb-100022
    So that for each j there is f j (0) = s j ;
    对于每个i∈S∪U*,令
    Figure PCTCN2017084174-appb-100023
    For each i∈S∪U * , order
    Figure PCTCN2017084174-appb-100023
    输出所述用户私钥SKS=(ASi,i∈S∪U*)。The user private key SK S =(AS i , i∈S∪U * ) is output.
  9. 如权利要求8所述的女巫攻击防御系统,其特征在于,所述签名算法为
    Figure PCTCN2017084174-appb-100024
    算法,其中运行预设的所述
    Figure PCTCN2017084174-appb-100025
    算法的步骤具体包括:
    The witch attack defense system of claim 8 wherein said signature algorithm is
    Figure PCTCN2017084174-appb-100024
    Algorithm in which the preset is run
    Figure PCTCN2017084174-appb-100025
    The steps of the algorithm specifically include:
    定义一个k元素的属性集
    Figure PCTCN2017084174-appb-100026
    Define a set of attributes for a k element
    Figure PCTCN2017084174-appb-100026
    定义缺省属性集
    Figure PCTCN2017084174-appb-100027
    其中|U′|=t-k;
    Define a default attribute set
    Figure PCTCN2017084174-appb-100027
    Where |U'|=tk;
    对于i∈S*∪U′,从标准差为σ的分布
    Figure PCTCN2017084174-appb-100028
    选择m维向量y1i,y2i,定义Y=(y1i,y2i)t,并计算ui=ζAY=ζ·a·y1i+y2imod 2q以及
    Figure PCTCN2017084174-appb-100029
    其中,p=[2q/2d],2q=p·2d+2q mod 2d
    For i∈S * ∪U', the distribution from the standard deviation is σ
    Figure PCTCN2017084174-appb-100028
    Select the m-dimensional vector y 1i , y 2i , define Y = (y 1i , y 2i ) t , and calculate u i = ζ AY = ζ · a · y 1i + y 2i mod 2q and
    Figure PCTCN2017084174-appb-100029
    Where p=[2q/2 d ], 2q=p·2 d +2q mod 2 d ;
    当i∈S′∪U′时,计算z1i=A((Δ1f1(i)c+y1i),当i∈S*\S′时,计算z1i=Ay1i,当i∈S′∪U′时,计算z2i=A((Δ2f2(i)c+y2i),当i∈S*\S′时,计算z2i=Ay2iWhen i∈S'∪U', calculate z 1i =A((Δ 1 f 1 (i)c+y 1i ), when i∈S * \S', calculate z 1i =Ay 1i , when i∈ When S'∪U', z 2i = A((Δ 2 f 2 (i)c+y 2i ) is calculated, and when i∈S * \S', z 2i = Ay 2i is calculated;
    输出概率为
    Figure PCTCN2017084174-appb-100030
    The output probability is
    Figure PCTCN2017084174-appb-100030
    计算
    Figure PCTCN2017084174-appb-100031
    Calculation
    Figure PCTCN2017084174-appb-100031
    输出签名
    Figure PCTCN2017084174-appb-100032
    Output signature
    Figure PCTCN2017084174-appb-100032
  10. 如权利要求9所述的女巫攻击防御系统,其特征在于,所述验证算法为
    Figure PCTCN2017084174-appb-100033
    算法,其中运行预设的所述
    Figure PCTCN2017084174-appb-100034
    算法的步骤具体包括:
    The witch attack defense system according to claim 9, wherein said verification algorithm is
    Figure PCTCN2017084174-appb-100033
    Algorithm in which the preset is run
    Figure PCTCN2017084174-appb-100034
    The steps of the algorithm specifically include:
    输入用户μ的签名
    Figure PCTCN2017084174-appb-100035
    并定义B使得A mod q=2B;
    Enter the signature of the user μ
    Figure PCTCN2017084174-appb-100035
    And define B such that A mod q=2B;
    如果
    Figure PCTCN2017084174-appb-100036
    则拒绝签名;
    in case
    Figure PCTCN2017084174-appb-100036
    Reject the signature;
    如果
    Figure PCTCN2017084174-appb-100037
    则拒绝签名;
    in case
    Figure PCTCN2017084174-appb-100037
    Reject the signature;
    如果
    Figure PCTCN2017084174-appb-100038
    则接受签名。
    in case
    Figure PCTCN2017084174-appb-100038
    Then accept the signature.
PCT/CN2017/084174 2017-05-12 2017-05-12 Sybil attack defense method and system WO2018205263A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/084174 WO2018205263A1 (en) 2017-05-12 2017-05-12 Sybil attack defense method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/084174 WO2018205263A1 (en) 2017-05-12 2017-05-12 Sybil attack defense method and system

Publications (1)

Publication Number Publication Date
WO2018205263A1 true WO2018205263A1 (en) 2018-11-15

Family

ID=64104207

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/084174 WO2018205263A1 (en) 2017-05-12 2017-05-12 Sybil attack defense method and system

Country Status (1)

Country Link
WO (1) WO2018205263A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104158661A (en) * 2014-07-23 2014-11-19 中国人民武装警察部队工程大学 Disposable public key encryption structuring method based on fuzzy identity
CN104506532A (en) * 2014-12-24 2015-04-08 北京智捷伟讯科技有限公司 Remote proving method applicable to emergency rescue platform
CN105897742A (en) * 2016-05-26 2016-08-24 北京航空航天大学 Anonymous identity-based access control method applicable to electronic healthy network
CN107172042A (en) * 2017-05-12 2017-09-15 深圳大学 A kind of Sybil attack defence method and its system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104158661A (en) * 2014-07-23 2014-11-19 中国人民武装警察部队工程大学 Disposable public key encryption structuring method based on fuzzy identity
CN104506532A (en) * 2014-12-24 2015-04-08 北京智捷伟讯科技有限公司 Remote proving method applicable to emergency rescue platform
CN105897742A (en) * 2016-05-26 2016-08-24 北京航空航天大学 Anonymous identity-based access control method applicable to electronic healthy network
CN107172042A (en) * 2017-05-12 2017-09-15 深圳大学 A kind of Sybil attack defence method and its system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
CHANG, WEI ET AL.: "Sybil Defenses in Mobile Social Networks", IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM, 12 June 2014 (2014-06-12), pages 641 - 646, XP032605019 *

Similar Documents

Publication Publication Date Title
Yazdinejad et al. Decentralized authentication of distributed patients in hospital networks using blockchain
Duan et al. Aggregating crowd wisdom via blockchain: A private, correct, and robust realization
Zhou et al. PSMPA: Patient self-controllable and multi-level privacy-preserving cooperative authentication in distributedm-healthcare cloud computing system
Xiong et al. Server-aided attribute-based signature supporting expressive access structures for industrial internet of things
US11244054B2 (en) Method and apparatus for trusted computing
JP6956878B1 (en) Systems and methods for authenticated control of content delivery
Ahamad et al. A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic
Ding et al. Derepo: A distributed privacy-preserving data repository with decentralized access control for smart health
Jayaraman et al. RETRACTED ARTICLE: A novel privacy preserving digital forensic readiness provable data possession technique for health care data in cloud
Das et al. A lightweight and anonymous mutual authentication scheme for medical big data in distributed smart healthcare systems
Zhang et al. BTNC: A blockchain based trusted network connection protocol in IoT
Miao et al. VKSE-MO: Verifiable keyword search over encrypted data in multi-owner settings
Shetty et al. Blockchain-based decentralized accountability and self-sovereignty in healthcare systems
ALmarwani et al. An effective, secure and efficient tagging method for integrity protection of outsourced data in a public cloud storage
Xu et al. Privacy-preserving and efficient truly three-factor authentication scheme for telecare medical information systems
Liang et al. Towards blockchain empowered trusted and accountable data sharing and collaboration in mobile healthcare applications
Ahmad et al. Efficient time-oriented latency-based secure data encryption for cloud storage
Alshehri et al. Dynamic secure access control and data sharing through trusted delegation and revocation in a blockchain-enabled cloud-IoT environment
Itoo et al. RKMIS: robust key management protocol for industrial sensor network system
Zhang et al. Cryptanalysis of an integrity checking scheme for cloud data sharing
Addobea et al. Secure multi-factor access control mechanism for pairing blockchains
Yan et al. Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment
Srivastava et al. Attack resistant blockchain-based healthcare record system using modified RSA Algorithm
Zhou et al. Secure fine-grained friend-making scheme based on hierarchical management in mobile social networks
Heshmati et al. Blockchain based authentication and access verfication scheme in smart home

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17908894

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 04/03/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17908894

Country of ref document: EP

Kind code of ref document: A1