WO2022082893A1 - Privacy blockchain-based internet of vehicles protection method, and mobile terminal - Google Patents

Privacy blockchain-based internet of vehicles protection method, and mobile terminal Download PDF

Info

Publication number
WO2022082893A1
WO2022082893A1 PCT/CN2020/127985 CN2020127985W WO2022082893A1 WO 2022082893 A1 WO2022082893 A1 WO 2022082893A1 CN 2020127985 W CN2020127985 W CN 2020127985W WO 2022082893 A1 WO2022082893 A1 WO 2022082893A1
Authority
WO
WIPO (PCT)
Prior art keywords
identity
service provider
user
data
private key
Prior art date
Application number
PCT/CN2020/127985
Other languages
French (fr)
Chinese (zh)
Inventor
孔庆磊
尹峰
崔曙光
Original Assignee
香港中文大学(深圳)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 香港中文大学(深圳) filed Critical 香港中文大学(深圳)
Publication of WO2022082893A1 publication Critical patent/WO2022082893A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3033Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to pseudo-prime or prime number generation, e.g. primality test
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Definitions

  • the present application relates to the technical field of Internet of Vehicles, and in particular to a method for protecting Internet of Vehicles and a mobile terminal based on a privacy blockchain.
  • Anonymization technology requires that the distribution of sensitive attribute values in all equivalence classes is the same as the probability distribution of all data in the data set, that is, when the sensitive attribute values of the target user do not change, the attacker cannot obtain private information from the data set.
  • Differential privacy techniques aim to provide a way to maximize the accuracy of data query results while minimizing the chance of identifying its records when querying a dataset. That is, by adding random noise to ensure that the data query is publicly visible, and the query results of the information will not vary from individual to individual.
  • the inventor of the present application found in the long-term research and development that although the blockchain technology can be used in a decentralized way, the Internet of Vehicles data collected by the vehicle sensors can be distributed in a distributed manner to achieve the purpose of preventing tampering.
  • identity privacy/location privacy sensitive data collected in the network If all participants can directly view the data recorded in the blockchain public ledger, then storing the data related to the Internet of Vehicles on the blockchain will lead to related vehicles/ User privacy exposed.
  • the data privacy leakage includes two aspects: the first aspect is that the data collected by the vehicle is strongly related to the location information, and the user's trajectory pattern, personal preferences and health status and other personal privacy information can be inferred from the location information; the second aspect is It is the association between the recorded data and the collected users.
  • the present application provides a method for protecting the Internet of Vehicles and a mobile terminal based on a privacy blockchain, so as to solve the problems in the prior art that the data of the Internet of Vehicles based on the blockchain technology cannot guarantee privacy and cannot verify the accuracy of the data.
  • a technical solution adopted in this application is to provide a method for protecting the Internet of Vehicles based on a privacy blockchain, the method comprising: performing initialization processing based on a homomorphic encryption algorithm; obtaining information between users and service providers; The data between the user and the service provider is collected based on the blockchain technology; the data query of the user by the service provider is realized based on the casual transmission protocol.
  • the mobile terminal includes a processor and a memory coupled to each other, the memory is used for storing a computer program, and the processor is used for The computer program is loaded and executed.
  • Another technical solution adopted in the present application is to provide a computer storage medium on which a computer program is stored, and the computer program is used to implement the steps of any one of the methods in the above embodiments.
  • the present application provides a method for protecting the Internet of Vehicles and a mobile terminal based on a privacy blockchain, and the method includes: performing initialization processing based on a homomorphic encryption algorithm; Service request stage information between service providers; data collection between users and service providers based on blockchain technology; data query from service providers to users based on inadvertent transmission protocols.
  • the system is initialized based on the homomorphic encryption algorithm, and the data is released to ensure the confidentiality of the data published on the blockchain.
  • the service request stage the information between the user and the service provider is obtained.
  • the data query stage based on The blockchain technology collects data between users and service providers.
  • the target ciphertext is acquired by using the inadvertent transmission protocol, so that the service provider can query the user's data, which solves the problem of the existing technology.
  • the data of the Internet of Vehicles cannot guarantee privacy and cannot verify the accuracy of the data.
  • FIG. 1 is a schematic flowchart of an embodiment of a privacy blockchain-based vehicle networking protection method of the present application
  • FIG. 2 is a schematic flowchart of another embodiment of a privacy blockchain-based vehicle networking protection method of the present application
  • Fig. 3 is the structural representation when Bloom filter carries out data storage
  • Fig. 4 is the structural schematic diagram when Bloom filter carries out data query
  • FIG. 5 is a schematic structural diagram of an embodiment of a mobile terminal of the present application.
  • FIG. 1 is a schematic flowchart of an embodiment of a method for protecting the Internet of Vehicles based on a privacy blockchain of the present application.
  • the method disclosed in this embodiment includes the following steps:
  • S11 Perform initialization processing based on a homomorphic encryption algorithm.
  • Homomorphic Encryption has the property of addition homomorphism and multiplication of homomorphism.
  • the additive homomorphic property means that the product of two ciphertexts will be decrypted as the sum of their corresponding plaintexts, which can be expressed by formula (1):
  • n is the product of two large prime numbers p 1 and p 2 .
  • the system initializes the terminal, performs initialization processing based on the homomorphic encryption algorithm, and can obtain the public key, private key and other information required in the blockchain.
  • Blockchain technology (Blockchain), the block chain is mainly composed of three parts, including transactions, blocks and consensus mechanisms.
  • Transaction Refers to an operation on the ledger, resulting in a change of the state in the ledger (such as adding a transfer record). Transactions can only take place between designated users signed with each user's private key. Transaction records are stored in blocks and cannot be altered or forged after being confirmed by the authentication process. In order to complete the transaction, it needs to be approved by the proof of consensus mechanism, which takes some time.
  • Block Records transactions and status results that occurred within a period of time, which is a consensus on the current ledger status. Each block is linked in sequence according to the transaction history. Each block has information linked to the previous block, so it is easy to judge whether it has been tampered with. Blocks that have been tampered with disappear from the network after the confirmation process.
  • POW Proof of Work, Proof of Work
  • PBFT Practical Byzantine Fault Tolerance
  • Practical Byzantine Fault Tolerance is an algorithm developed for the execution environment of a distributed system based on state machine copy replication, aiming to allow most of the honest nodes in the system to cover malicious nodes or invalid nodes the behavior of.
  • S12 Acquire the service request stage information between the user and the service provider.
  • the user requests the service from the service provider, and the identity-based encryption signature scheme verifies the user.
  • the service provider receives the user's service request.
  • S13 Collect data between users and service providers based on blockchain technology.
  • the blockchain technology based on proof of stake as a consensus mechanism is used to publish the aggregated results of the ciphertext data and signatures of the user's driving behavior.
  • the vehicle data in the blockchain is encrypted and published.
  • the participating generation nodes ensure the correctness of the published data through signature verification.
  • the service provider can query the data recorded by the user on the blockchain, and use the inadvertent transmission protocol to obtain the verification and aggregation results, so as to realize the service provider's data query on the user.
  • the present application provides a method for protecting the Internet of Vehicles based on privacy blockchain, the method includes: initializing processing based on a homomorphic encryption algorithm; obtaining service request stage information between a user and a service provider; Data collection with service providers; based on inadvertent transmission protocol to realize service provider's data query of users.
  • the system is initialized based on the homomorphic encryption algorithm, and the data is released to ensure the confidentiality of the data released on the blockchain.
  • the service request stage the information between the user and the service provider is obtained.
  • the data query stage based on Blockchain technology collects data between users and service providers.
  • inadvertent transmission protocols are used to obtain the target ciphertext, so that service providers can query users' data and ensure the data of the Internet of Vehicles. Privacy and Verification of Data Accuracy.
  • FIG. 2 is a schematic flowchart of another embodiment of a privacy blockchain-based vehicle networking protection method of the present application.
  • the method disclosed in this embodiment includes the following steps:
  • an identity-based signature technology (Identity-based Signature, IBS) is used.
  • the design goal of the identity-based cryptographic algorithm is to ensure the security of information exchange and verify each other without the need to exchange public and private keys, save the key directory, and use a third party to provide authentication services. between the signatures.
  • the identity-based signature scheme is a set of polynomial-time algorithms with security parameter k, which can be used by formula (3)
  • IBS (Setup, KeyGen, Sign, Verify) (3)
  • Setup is an input security parameter of k bits, and a master public key/master private key pair (mpk, msk) is generated.
  • KeyGen takes the input msk and identity id ⁇ ⁇ 0, 1 ⁇ * , returns a private key usk corresponding to the user id, and securely sends usk to the user.
  • Sign takes the input key usk and the message m ⁇ 0,1 ⁇ * , and returns a signature ⁇ to the message m.
  • Verify takes input mpk, id, m and ⁇ , if ⁇ is valid for id, m; then returns 1, otherwise it returns 0.
  • S211 Presetting the first security parameter, the trusted organization initializes the homomorphic encryption system, generates two large prime numbers, and calculates the public key according to the two large prime numbers.
  • S212 Preset the second security parameter to generate a bilinear parameter.
  • bilinear parameters are generated: (q, P, G, GT , H, e).
  • S213 Generate a system public key, an identity-based private key, and a system public parameter according to the hash function and the preset system private key.
  • G, G T are multiplicative cyclic groups of order q, q is a large prime number; P is the generator of G; pk s is the public key of the system; g s is the exponential operation; id t is the identity of the trusted organization operator; e is the bilinear mapping operation.
  • Bloom Filter is a random data structure with high space efficiency.
  • FIG. 3 is a schematic diagram of the structure when the Bloom filter performs data storage
  • FIG. 4 is a schematic diagram of the structure when the Bloom filter performs data query.
  • the length of the bit string is b
  • the number of hash functions H is k.
  • Bloom Filter is a bit array containing m bits, and each bit is set to 0.
  • Bloom Filter uses k independent hash functions, which respectively map each element in the set to ⁇ 1, 2, ..., m ⁇ in the range.
  • the position h i (x) of the ith hash function map will be set to 1 (1 ⁇ i ⁇ k). Note that if a position is set to 1 multiple times, only the first time will work. For example, in Figure 2, there are two hash functions that select the same bit position (fifth from the left).
  • S215 Generate the service provider public key and the service provider private key between the trusted authority and the service provider identity.
  • the trusted authority sends the identity-based first private key of the service provider's identity, and uses the first random number as the second private key to generate the first public key.
  • the first secret random number chosen by the service provider identity secret.
  • the trusted authority computes the identity-based first private key, and will Sent to service provider id a . At the same time, select the first random number as the second private key and generate the first public key
  • the service provider id a secretly chooses a random number t a .
  • S216 Generate the user public key and the user private key between the trusted authority and each user.
  • the user identity sends the anonymous identity to the trusted authority to generate the first signature.
  • the user identity obtains the identity-based third private key sent by the trusted authority.
  • the user identity uses the second random number as the fourth private key and generates a second public key associated with the fourth private key.
  • S221 The user identity generates a first signature pair according to the anonymous identity and the third random number, and generates a service request message according to the first signature pair.
  • the user id i uses the anonymous identity pid i,j to select the third random number Generate the corresponding first signature pair As shown in formula (4):
  • User id i generates and sends a service request message to the service provider id a .
  • S222 The user identity sends a service request message to the service provider identity.
  • User id i generates and sends a service request message to the service provider id a .
  • S223 The user identity verifies the correctness of the anonymous identity and the first signature, and performs bilinear calculation to obtain the calculation result.
  • the service provider id a accepts the service request sent by the user identity.
  • S23 Collect data between users and service providers based on blockchain technology.
  • S231 The user identity selects a fourth random number to generate a ciphertext to encrypt the vehicle data.
  • the user id i selects a fourth random number Generate ciphertext, as shown in formula (6):
  • the user identity selects the fifth random number to generate the second signature pair of the vehicle data, so as to ensure the correctness of the vehicle data.
  • the user id i selects a random number And generate the second signature pair, as shown in formula (7):
  • S233 The user identity sends the second signature pair to the vehicle identity, and verifies the authenticity of the second signature pair.
  • the vehicle identity generates a vehicle message according to the ciphertext and the second signature pair, and sends the vehicle message to the service provider identity.
  • the vehicle id v When the verification result is true, the vehicle id v generates the vehicle message according to the ciphertext and the second signature pair and send it to the service provider id a .
  • S235 The service provider identity performs merge processing on the anonymous identity and the second signature pair.
  • the service provider id a combines the anonymous identities pid i, j and the second signature of the data data i , as shown in formula (9):
  • the service provider identity collects the vehicle data of the at least one user identity, publishes the vehicle data of the at least one user identity and the second signature on the block based on the inadvertent transmission protocol, and the service provider identity inserts the anonymous identity of the at least one user identity into the block. Bloom filter.
  • the service provider id a collects the vehicle data of k users, and uses the OT (Oblivious Transfer) protocol to publish the vehicle data and signatures of multiple users on the block. At the same time, the service provider id a inserts the anonymous data of the k users into the block.
  • Bloom filter BF a anonymous data retrieval by Bloom filter. Among them, the Bloom filter performs preliminary user positioning, and the OT protocol performs content acquisition.
  • S237 The service provider identity generates a new transaction in each vehicle data release cycle, and sends the transaction to the service provider identity.
  • the service provider id a In each data release cycle, the service provider id a generates a new transaction and sends the new transaction to all service providers, as shown in Table 1, where c is the user ciphertext.
  • the transaction includes a first subject including a first timestamp and a service provider identity.
  • S238 The service provider identity uses the consensus mechanism to generate a new block.
  • the block includes a second body, and the second body includes a second timestamp, the identity of the primary service provider, a digest of the previous block, and a proof of stake.
  • S241 The service provider identity inserts the past anonymous identity of the queried user into the blockchain to obtain at least one past transaction.
  • the service provider id b wants to query the data recorded on the chain for a given user id i , the service provider id b first uses the past anonymity of the user id i ⁇ pid i, 1 , ..., pid i, j ⁇ Insert the blockchain and find the corresponding transaction.
  • S242 Obtain at least one ciphertext group and signature group associated with the past transaction based on the inadvertent transmission protocol, and obtain and verify the aggregation result.
  • a Modified Paillier homomorphic encryption algorithm and an identity-based encryption signature scheme are designed to realize the privacy data protection and verifiability of vehicle data. sex.
  • a user's driving behavior and habits can be reflected; using blockchain technology based on proof of stake as a consensus mechanism to publish the aggregated results of the ciphertext data and signatures of the user's driving behavior, and generate them in blocks , the participating generation nodes ensure the correctness of the published data through signature verification.
  • the data recorded on the blockchain needs to maintain the confidentiality of the data in the blockchain on the one hand, which ensures the privacy of the shared data content;
  • the data of the Internet of Vehicles is related to the interests of customers in traffic safety, which ensures the authenticity of the data shared on the blockchain;
  • the data of the target producer can be found on the blockchain without revealing the data producer.
  • This embodiment publishes data based on the homomorphic encryption algorithm, which can ensure the confidentiality of the published data on the chain; an identity-based encryption signature scheme is used to verify the correctness of the published data; anonymized data is performed through a Bloom filter Retrieval; use inadvertent transmission protocol to obtain the target ciphertext.
  • the present application provides a method for protecting the Internet of Vehicles based on privacy blockchain, the method includes: initializing processing based on a homomorphic encryption algorithm; obtaining service request stage information between a user and a service provider; Data collection with service providers; based on inadvertent transmission protocol to realize service provider's data query of users.
  • the system is initialized based on the homomorphic encryption algorithm, and the data is released to ensure the confidentiality of the data published on the blockchain.
  • the service request stage the information between the user and the service provider is obtained.
  • the data query stage based on Blockchain technology collects data between users and service providers.
  • inadvertent transmission protocols are used to obtain the target ciphertext, so that service providers can query users' data and ensure the data of the Internet of Vehicles. Privacy and Verification of Data Accuracy.
  • FIG. 5 is a schematic structural diagram of an embodiment of a mobile terminal of the present application.
  • the mobile terminal 100 disclosed in the present application includes a memory 12 and a processor 14 coupled to each other, the memory 12 is used for storing a computer program, and the processor 14 is used for executing the computer program to implement the steps of any of the methods in the foregoing embodiments.
  • processor 14 is used to:
  • the data between users and service providers is collected based on blockchain technology.
  • the service provider's data query to the user is realized based on the casual transmission protocol.
  • the mobile terminal 100 in this embodiment ensures the privacy of the Internet of Vehicles data and the accuracy of the verification data.
  • the systems, devices and methods disclosed in this application may be implemented in other ways.
  • the device implementations described above are only illustrative.
  • the division of the modules or units is only a logical function division. In actual implementation, there may be other divisions.
  • multiple units or components may be Incorporation may either be integrated into another system, or some features may be omitted, or not implemented.
  • the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this implementation manner.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as an independent product, may be stored in a computer-readable storage medium.
  • the technical solutions of the present application can be embodied in the form of software products in essence, or the parts that contribute to the prior art, or all or part of the technical solutions, and the computer software products are stored in a storage medium , including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor (processor) to execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage medium includes: U disk, mobile hard disk, Read-Only Memory (ROM, Read-Only Memory), Random Access Memory (RAM, Random Access Memory), magnetic disk or optical disk and other media that can store program codes .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Algebra (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Power Engineering (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present application provides a privacy blockchain-based Internet of Vehicles protection method, and a mobile terminal. Said method comprises: performing initialization processing on the basis of a homomorphic encryption algorithm; acquiring service request stage information between a user and a service provider; collecting data between the user and the service provider on the basis of the blockchain technology; and implementing query of the service provider to user data on the basis of an oblivious transfer protocol. A system is initialized on the basis of the homomorphic encryption algorithm, and data is published, so as to ensure confidentiality of the data published on a blockchain; information between the user and the service provider is acquired in a service request stage; in a data query stage, the data between the user and the service provider is collected on the basis of the blockchain technology; and at a data acquisition stage, a target ciphertext is acquired using the oblivious transfer protocol, so that query of the service provider to user data is implemented, and the privacy of Internet of Vehicles data and the accuracy of data verification can be ensured.

Description

一种基于隐私区块链的车联网保护方法和移动终端A method and mobile terminal for protecting the Internet of Vehicles based on privacy blockchain 技术领域technical field
本申请涉及车联网技术领域,具体涉及一种基于隐私区块链的车联网保护方法和移动终端。The present application relates to the technical field of Internet of Vehicles, and in particular to a method for protecting Internet of Vehicles and a mobile terminal based on a privacy blockchain.
背景技术Background technique
近年来,针对车联网以及车载传感器网络中的安全与隐私保护问题,来自通信行业、计算机科学专业,以及网络安全领域的专家学者们在保护车联网安全及其所涉及的数据隐私方面,开展了大量的研究工作。由于车载传感器所搜集到的数据价值与地理位置和时间信息相关,而位置信息包括用户的个人敏感信息,例如工作与家庭地址、个人偏好与习惯、社会关系。在现有的研究中,针对车联网架构中的数据隐私保护问题,主要覆盖了以下几种关键技术:In recent years, in view of the security and privacy protection issues in the Internet of Vehicles and in-vehicle sensor networks, experts and scholars from the communication industry, computer science majors, and the field of network security have carried out efforts to protect the security of the Internet of Vehicles and the data privacy involved. A lot of research work. Because the value of data collected by in-vehicle sensors is related to geographic location and time information, and location information includes sensitive personal information of users, such as work and home addresses, personal preferences and habits, and social relationships. In the existing research, aiming at the protection of data privacy in the Internet of Vehicles architecture, the following key technologies are mainly covered:
1)匿名化技术。匿名隐私保护技术要求所有等价类中敏感属性值的分布与数据集中全部数据的概率分布相同,即当目标用户的敏感属性值不发生变化时,攻击者无法从数据集中获得隐私信息。1) Anonymization technology. Anonymous privacy protection technology requires that the distribution of sensitive attribute values in all equivalence classes is the same as the probability distribution of all data in the data set, that is, when the sensitive attribute values of the target user do not change, the attacker cannot obtain private information from the data set.
2)差分隐私技术。差分隐私技术旨在提供一种对数据集进行查询 时,最大化数据查询结果的准确性,同时最大限度减少识别其记录的机会。即通过添加随机噪声来确保数据查询的公开可见,且信息的查询结果并不会因个体而随之变化。2) Differential privacy technology. Differential privacy techniques aim to provide a way to maximize the accuracy of data query results while minimizing the chance of identifying its records when querying a dataset. That is, by adding random noise to ensure that the data query is publicly visible, and the query results of the information will not vary from individual to individual.
3)数据加密技术。在众多的安全策略中,加密技术可以保证在恶意环境中的用户设备或进程之间相关数据的安全与隐私。在现有的加密数据保护策略主要集中于数据传输阶段、数据存储阶段和数据处理阶段。3) Data encryption technology. Among many security strategies, encryption technology can ensure the security and privacy of related data between user devices or processes in malicious environments. The existing encryption data protection strategies mainly focus on the data transmission stage, the data storage stage and the data processing stage.
本申请的发明人在长期研发中发现,尽管通过区块链技术可以通过去中心化的方式,可以对车载传感器搜集到的车联网数据进行分布式的发布并达到防篡改的目的,然而对于车载网络中收集的身份隐私/位置隐私敏感数据而言:若所有参与者皆可以直接查看区块链公共账本中记录的数据,那么将车联网相关数据存储在区块链上,会导致相关车辆/用户的隐私暴露。其中数据隐私泄露包括两个方面:第一个方面是由于车辆搜集数据与位置信息强相关,且根据位置信息可以推断出用户的轨迹模式、个人偏好和健康状况等个人隐私信息;第二个方面是记录数据与采集用户之间的关联,根据区块链中记录数据交易之间的关联,仍能推测出单个采集用户数据的产生频率。同时,由于区块链技术本身可以保证数据的不可篡改性但不能保证数据的真实性,因此系统的参与者需要验证链中记录数据的准确性。The inventor of the present application found in the long-term research and development that although the blockchain technology can be used in a decentralized way, the Internet of Vehicles data collected by the vehicle sensors can be distributed in a distributed manner to achieve the purpose of preventing tampering. In terms of identity privacy/location privacy sensitive data collected in the network: If all participants can directly view the data recorded in the blockchain public ledger, then storing the data related to the Internet of Vehicles on the blockchain will lead to related vehicles/ User privacy exposed. The data privacy leakage includes two aspects: the first aspect is that the data collected by the vehicle is strongly related to the location information, and the user's trajectory pattern, personal preferences and health status and other personal privacy information can be inferred from the location information; the second aspect is It is the association between the recorded data and the collected users. According to the association between the recorded data transactions in the blockchain, it is still possible to infer the frequency of the generation of individual collected user data. At the same time, since the blockchain technology itself can guarantee the immutability of data but cannot guarantee the authenticity of the data, the participants of the system need to verify the accuracy of the data recorded in the chain.
发明内容SUMMARY OF THE INVENTION
本申请提供一种基于隐私区块链的车联网保护方法和移动终端,以解决现有技术中基于区块链技术的车联网数据不能保证隐私和不能验证数据的准确性的问题。The present application provides a method for protecting the Internet of Vehicles and a mobile terminal based on a privacy blockchain, so as to solve the problems in the prior art that the data of the Internet of Vehicles based on the blockchain technology cannot guarantee privacy and cannot verify the accuracy of the data.
为解决上述技术问题,本申请采用的一个技术方案是:提供一种基于隐私区块链的车联网保护方法,所述方法包括:基于同态加密算法进行初始化处理;获取用户与服务提供商之间的服务请求阶段信息;基于区块链技术对所述用户与所述服务提供商之间的数据进行收集;基于不经意传输协议实现所述服务提供商对所述用户的数据查询。In order to solve the above technical problems, a technical solution adopted in this application is to provide a method for protecting the Internet of Vehicles based on a privacy blockchain, the method comprising: performing initialization processing based on a homomorphic encryption algorithm; obtaining information between users and service providers; The data between the user and the service provider is collected based on the blockchain technology; the data query of the user by the service provider is realized based on the casual transmission protocol.
为解决上述技术问题,本申请采用的另一个技术方案是:提供一种移动终端,所述移动终端包括相互耦接的处理器和存储器,所述存储器用于存储计算机程序,所述处理器用于加载所述计算机程序并执行。In order to solve the above technical problems, another technical solution adopted in the present application is to provide a mobile terminal, the mobile terminal includes a processor and a memory coupled to each other, the memory is used for storing a computer program, and the processor is used for The computer program is loaded and executed.
为解决上述技术问题,本申请采用的又一个技术方案是:提供一种计算机存储介质,其上存有计算机程序,所述计算机程序用于实现上述实施方式中任一项方法的步骤。In order to solve the above technical problem, another technical solution adopted in the present application is to provide a computer storage medium on which a computer program is stored, and the computer program is used to implement the steps of any one of the methods in the above embodiments.
本申请的有益效果是:区别于现有技术的情况,本申请提供一种基于隐私区块链的车联网保护方法和移动终端,该方法包括:基于同 态加密算法进行初始化处理;获取用户与服务提供商之间的服务请求阶段信息;基于区块链技术对用户与服务提供商之间的数据进行收集;基于不经意传输协议实现服务提供商对用户的数据查询。通过基于同态加密算法对系统进行初始化,并对数据进行发布,以保证区块链上发布数据的保密性,在服务请求阶段获取用户与服务提供商之间的信息,在数据查询阶段,基于区块链技术对用户与服务提供商之间的数据进行收集,在数据获取接端,利用不经意传输协议,对目标密文进行获取,实现服务提供商对用户的数据查询,解决了现有技术中车联网数据不能保证隐私和不能验证数据的准确性的问题。The beneficial effects of the present application are: different from the situation in the prior art, the present application provides a method for protecting the Internet of Vehicles and a mobile terminal based on a privacy blockchain, and the method includes: performing initialization processing based on a homomorphic encryption algorithm; Service request stage information between service providers; data collection between users and service providers based on blockchain technology; data query from service providers to users based on inadvertent transmission protocols. The system is initialized based on the homomorphic encryption algorithm, and the data is released to ensure the confidentiality of the data published on the blockchain. In the service request stage, the information between the user and the service provider is obtained. In the data query stage, based on The blockchain technology collects data between users and service providers. At the data acquisition terminal, the target ciphertext is acquired by using the inadvertent transmission protocol, so that the service provider can query the user's data, which solves the problem of the existing technology. The data of the Internet of Vehicles cannot guarantee privacy and cannot verify the accuracy of the data.
附图说明Description of drawings
为了更清楚地说明申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的情况下,还可以根据这些附图获得其他的附图,其中:In order to illustrate the technical solutions in the embodiments of the application more clearly, the following briefly introduces the drawings used in the description of the embodiments. Obviously, the drawings in the following description are only some embodiments of the application. For those of ordinary skill in the art, other drawings can also be obtained from these drawings without any creative effort, wherein:
图1是本申请一种基于隐私区块链的车联网保护方法一实施例的流程示意图;1 is a schematic flowchart of an embodiment of a privacy blockchain-based vehicle networking protection method of the present application;
图2是本申请一种基于隐私区块链的车联网保护方法另一实施例的流程示意图;2 is a schematic flowchart of another embodiment of a privacy blockchain-based vehicle networking protection method of the present application;
图3是布隆过滤器进行数据存储时的结构示意图;Fig. 3 is the structural representation when Bloom filter carries out data storage;
图4是布隆过滤器进行数据查询时的结构示意图;Fig. 4 is the structural schematic diagram when Bloom filter carries out data query;
图5是本申请一种移动终端一实施例的结构示意图。FIG. 5 is a schematic structural diagram of an embodiment of a mobile terminal of the present application.
具体实施方式Detailed ways
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动情况下所获得的所有其他实施例,均属于本申请保护的范围。The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative work fall within the protection scope of the present application.
需要说明,若本申请实施例中有涉及“第一”、“第二”等的描述,则该“第一”、“第二”等的描述仅用于描述目的,而不能理解为指示或暗示其相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括至少一个该特征。另外,各个实施例之间的技术方案可以相互结合,但是必须是以本领域普通技术人员能够实现为基础,当技术方案的结合出现相互矛盾或无法实现时应当认为这种技术方案的结合不存在,也不在本申请要求的保护范围之内。It should be noted that if there are descriptions involving "first", "second", etc. in the embodiments of this application, the descriptions of "first", "second", etc. are only used for description purposes, and should not be construed as instructions or Implicit their relative importance or implicitly indicate the number of technical features indicated. Thus, a feature delimited with "first", "second" may expressly or implicitly include at least one of that feature. In addition, the technical solutions between the various embodiments can be combined with each other, but must be based on the realization by those of ordinary skill in the art. When the combination of technical solutions is contradictory or cannot be realized, it should be considered that the combination of such technical solutions does not exist. , is not within the scope of protection claimed in this application.
请参阅图1,图1是本申请一种基于隐私区块链的车联网保护方法一实施例的流程示意图。本实施例揭示的方法包括以下步骤:Please refer to FIG. 1. FIG. 1 is a schematic flowchart of an embodiment of a method for protecting the Internet of Vehicles based on a privacy blockchain of the present application. The method disclosed in this embodiment includes the following steps:
S11:基于同态加密算法进行初始化处理。S11: Perform initialization processing based on a homomorphic encryption algorithm.
同态加密技术(Homomorphic Encryption)具有加法同态属性和数乘同态属性。Homomorphic encryption technology (Homomorphic Encryption) has the property of addition homomorphism and multiplication of homomorphism.
加法同态属性是指,两个密文的乘积将解密为它们相应的明文之和,可用公式(1)表示:The additive homomorphic property means that the product of two ciphertexts will be decrypted as the sum of their corresponding plaintexts, which can be expressed by formula (1):
D(E(m 1)*E(m 2)mod n 2)=m 1+m 2mod n     (1) D(E(m 1 )*E(m 2 )mod n 2 )=m 1 +m 2 mod n (1)
其中,m 1为第一明文、m 2为第二明文,E为加密函数,D为解密函数,n为两个大素数p 1、p 2的乘积。 Among them, m 1 is the first plaintext, m 2 is the second plaintext, E is the encryption function, D is the decryption function, and n is the product of two large prime numbers p 1 and p 2 .
数乘同态属性可用,公式(2)表示:The number multiplication homomorphism property is available, and the formula (2) expresses:
Figure PCTCN2020127985-appb-000001
Figure PCTCN2020127985-appb-000001
利用同态加密技术,在密文域进行操作相当于在明文域进行操作。这种性质使得密文域的数据处理、分析或检索等成为可能。即,不解密任何密文的条件下对仍然可以对相应明文进行的运算,使得对加密信息仍能进行深入和无限的分析和处理。Using homomorphic encryption technology, operations in the ciphertext domain are equivalent to operations in the plaintext domain. This property makes it possible to process, analyze or retrieve data in the ciphertext domain. That is, without decrypting any ciphertext, the operation can still be performed on the corresponding plaintext, so that the encrypted information can still be deeply and infinitely analyzed and processed.
系统初始化接端,基于同态加密算法进行初始化处理,可以得到区块链中需要的公钥、私钥等信息。The system initializes the terminal, performs initialization processing based on the homomorphic encryption algorithm, and can obtain the public key, private key and other information required in the blockchain.
区块链技术(Blockchain),区块链主要由三个部分组成,其中包 括交易,区块和共识机制。Blockchain technology (Blockchain), the block chain is mainly composed of three parts, including transactions, blocks and consensus mechanisms.
交易(Transaction):指一次对账本的操作,导致账本中状态的一次改变(如添加一条转账记录)。只有在用各个用户的私钥签名被指定的用户之间方可进行交易。交易记录被储存到区块内,经过认证过程确认以后不得变更或伪造。为了完成交易,需经过共识机制的证明得到批准,需要一些时间。Transaction: Refers to an operation on the ledger, resulting in a change of the state in the ledger (such as adding a transfer record). Transactions can only take place between designated users signed with each user's private key. Transaction records are stored in blocks and cannot be altered or forged after being confirmed by the authentication process. In order to complete the transaction, it needs to be approved by the proof of consensus mechanism, which takes some time.
区块(Block):记录一段时间内发生的交易和状态结果等,是对当前账本状态的一次共识。各个区块根据交易履历按顺序依次相连结。各个区块都具有与前后区块相连结的信息,所以很容易判断是否经过篡改。已被篡改的区块经确认过程后从网络中消失。Block: Records transactions and status results that occurred within a period of time, which is a consensus on the current ledger status. Each block is linked in sequence according to the transaction history. Each block has information linked to the previous block, so it is easy to judge whether it has been tampered with. Blocks that have been tampered with disappear from the network after the confirmation process.
共识机制(Consensus):实现区块链共识的方式种类也有很多,例如:Consensus: There are many ways to achieve blockchain consensus, such as:
1.POW(Proof of Work,工作量证明),即故意使想连接电脑系统的所有个体履行耗费时间的工作,保护系统免受企图攻击系统的恶意连接人攻击的手段。1. POW (Proof of Work, Proof of Work), that is, a means of deliberately making all individuals who want to connect to a computer system perform time-consuming work to protect the system from malicious connections who attempt to attack the system.
2.POS(Proof of Stake,权益证明),即权益证明方式不是消耗计算机资源而是通过自己持有的权益(stake)生成区块。2. POS (Proof of Stake, Proof of Stake), that is, the method of Proof of Stake does not consume computer resources but generates blocks through the stake it holds.
3.PBFT(Practical Byzantine Fault Tolerance,实用拜占庭容错算法),是针对状态机副本复制为主的分布式系统执行环境开发的算法, 旨在让系统中大部分的诚实节点来覆盖恶意节点或无效节点的行为。3. PBFT (Practical Byzantine Fault Tolerance, Practical Byzantine Fault Tolerance) is an algorithm developed for the execution environment of a distributed system based on state machine copy replication, aiming to allow most of the honest nodes in the system to cover malicious nodes or invalid nodes the behavior of.
S12:获取用户与服务提供商之间的服务请求阶段信息。S12: Acquire the service request stage information between the user and the service provider.
在服务请求阶段,用户向服务提供商请求服务,基于身份的加密签名方案对用户进行验证,当验证结果正确时,服务提供商接收用户的服务请求。In the service request stage, the user requests the service from the service provider, and the identity-based encryption signature scheme verifies the user. When the verification result is correct, the service provider receives the user's service request.
S13:基于区块链技术对用户与服务提供商之间的数据进行收集。S13: Collect data between users and service providers based on blockchain technology.
在数据收集阶段,利用基于权益证明作为共识机制的区块链技术来对用户驾驶行为的密文数据和签名的聚合结果进行发布。对区块链中的车辆数据进行加密和发布,在区块生成时,参与的生成节点通过签名验证来保证发布数据的正确性。In the data collection stage, the blockchain technology based on proof of stake as a consensus mechanism is used to publish the aggregated results of the ciphertext data and signatures of the user's driving behavior. The vehicle data in the blockchain is encrypted and published. When the block is generated, the participating generation nodes ensure the correctness of the published data through signature verification.
S14:基于不经意传输协议实现服务提供商对用户的数据查询。S14: Realize the data query of the user by the service provider based on the inadvertent transmission protocol.
在数据查询阶段,服务提供商可以查询用户在区块链上记录的数据,利用不经意传输协议获得验证聚合结果,实现服务提供商对用户的数据查询。In the data query stage, the service provider can query the data recorded by the user on the blockchain, and use the inadvertent transmission protocol to obtain the verification and aggregation results, so as to realize the service provider's data query on the user.
本申请提供一种基于隐私区块链的车联网保护方法,该方法包括:基于同态加密算法进行初始化处理;获取用户与服务提供商之间的服务请求阶段信息;基于区块链技术对用户与服务提供商之间的数据进行收集;基于不经意传输协议实现服务提供商对用户的数据查询。通过基于同态加密算法对系统进行初始化,并对数据进行发布, 以保证区块链上发布数据的保密性,在服务请求阶段获取用户与服务提供商之间的信息,在数据查询阶段,基于区块链技术对用户与服务提供商之间的数据进行收集,在数据获取接端,利用不经意传输协议,对目标密文进行获取,实现服务提供商对用户的数据查询,能够保证车联网数据隐私和验证数据的准确性。The present application provides a method for protecting the Internet of Vehicles based on privacy blockchain, the method includes: initializing processing based on a homomorphic encryption algorithm; obtaining service request stage information between a user and a service provider; Data collection with service providers; based on inadvertent transmission protocol to realize service provider's data query of users. The system is initialized based on the homomorphic encryption algorithm, and the data is released to ensure the confidentiality of the data released on the blockchain. In the service request stage, the information between the user and the service provider is obtained. In the data query stage, based on Blockchain technology collects data between users and service providers. At the data acquisition terminal, inadvertent transmission protocols are used to obtain the target ciphertext, so that service providers can query users' data and ensure the data of the Internet of Vehicles. Privacy and Verification of Data Accuracy.
在上述实施方式的基础上,请参阅图2,图2是本申请一种基于隐私区块链的车联网保护方法另一实施例的流程示意图。本实施例揭示的方法包括以下步骤:On the basis of the above embodiments, please refer to FIG. 2 , which is a schematic flowchart of another embodiment of a privacy blockchain-based vehicle networking protection method of the present application. The method disclosed in this embodiment includes the following steps:
S21:基于同态加密算法进行初始化处理。S21: Perform initialization processing based on a homomorphic encryption algorithm.
在本实施例中采用基于身份的签名技术(Identity-based Signature,IBS)。In this embodiment, an identity-based signature technology (Identity-based Signature, IBS) is used.
在传统的公钥基础设施(Public Key Infrastructure,PKI)之中,公钥与用户身份之间的安全体系保证是由证书来实现的,其本质是利用权威机构为用户进行签名。然而,这种管理体系存在多种与证书管理相关的问题:证书撤销,证书存储和证书分配等等,这些过程会占用大量的带宽资源和计算资源。In the traditional public key infrastructure (Public Key Infrastructure, PKI), the security system guarantee between the public key and the user identity is realized by the certificate, and its essence is to use the authoritative organization to sign the user. However, this management system has various problems related to certificate management: certificate revocation, certificate storage and certificate distribution, etc. These processes consume a lot of bandwidth resources and computing resources.
基于身份的密码算法的设计目标是让通信双方在不需要交换公私秘钥,不需要保存秘钥目录,且不需要使用第三方提供认证服务的情况下,保证信息交换的安全性并可以验证相互之间的签名。基于身份 的签名方案是一组安全参数为k的多项式时间算法,可用公式(3)The design goal of the identity-based cryptographic algorithm is to ensure the security of information exchange and verify each other without the need to exchange public and private keys, save the key directory, and use a third party to provide authentication services. between the signatures. The identity-based signature scheme is a set of polynomial-time algorithms with security parameter k, which can be used by formula (3)
表示:express:
IBS=(Setup,KeyGen,Sign,Verify)        (3)IBS=(Setup, KeyGen, Sign, Verify) (3)
其中,Setup是输入k比特的安全参数,生成主公钥/主私钥对(mpk,msk)。KeyGen是输入msk和身份id∈{0,1} *,返回一个与用户id相对应的私钥usk,并将usk安全地发送给该用户。Sign是输入密钥usk和消息m∈{0,1} *,返回一个对消息m的签名σ。Verify是输入mpk、id、m和σ,如果σ对于id、m是有效的;那么返回1,否则将会返回0。 Among them, Setup is an input security parameter of k bits, and a master public key/master private key pair (mpk, msk) is generated. KeyGen takes the input msk and identity id ∈ {0, 1} * , returns a private key usk corresponding to the user id, and securely sends usk to the user. Sign takes the input key usk and the message m∈{0,1} * , and returns a signature σ to the message m. Verify takes input mpk, id, m and σ, if σ is valid for id, m; then returns 1, otherwise it returns 0.
在一具体实施例中,包括下述步骤S211~S216:In a specific embodiment, the following steps S211-S216 are included:
S211:预设第一安全参数,可信机构对同态加密系统进行初始化,生成两个大素数,并根据两个大素数计算公钥。S211: Presetting the first security parameter, the trusted organization initializes the homomorphic encryption system, generates two large prime numbers, and calculates the public key according to the two large prime numbers.
基于一个给定的第一安全参数k,一个可信机构通过初始化Modified(改进)Paillier同态加密系统,生成两个大素数p 1,p 2,计算公钥(n=p 1*p 2,g=μ 2mod n 2),其中
Figure PCTCN2020127985-appb-000002
Figure PCTCN2020127985-appb-000003
μ为一个随机数,g为一个元素,
Figure PCTCN2020127985-appb-000004
表示模为n 2的有限交换 群。
Based on a given first security parameter k, a trusted authority initializes the Modified (improved) Paillier homomorphic encryption system, generates two large prime numbers p 1 , p 2 , and calculates the public key (n=p 1 *p 2 , g=μ 2 mod n 2 ), where
Figure PCTCN2020127985-appb-000002
Figure PCTCN2020127985-appb-000003
μ is a random number, g is an element,
Figure PCTCN2020127985-appb-000004
represents a finite commutative group modulo n 2 .
S212:预设第二安全参数,生成双线性参数。S212: Preset the second security parameter to generate a bilinear parameter.
基于另一个给定的第二安全参数k 1,生成双线性参数:(q,P,G,G T,H,e)。 Based on another given second security parameter k 1 , bilinear parameters are generated: (q, P, G, GT , H, e).
S213:根据哈希函数和预设系统私钥,生成系统公钥、基于身份的私钥和系统公开参数。S213: Generate a system public key, an identity-based private key, and a system public parameter according to the hash function and the preset system private key.
选择哈希函数
Figure PCTCN2020127985-appb-000005
其中,
Figure PCTCN2020127985-appb-000006
表示表示模为q的有限交换群。选择一个随机数
Figure PCTCN2020127985-appb-000007
作为系统私钥,并生成系统公钥pk s=g s∈G。计算基于身份的私钥,
Figure PCTCN2020127985-appb-000008
输出的系统公开参数为
Figure PCTCN2020127985-appb-000009
Choose a hash function
Figure PCTCN2020127985-appb-000005
in,
Figure PCTCN2020127985-appb-000006
Denotes a finite commutative group of representation modulo q. pick a random number
Figure PCTCN2020127985-appb-000007
As the system private key, and generate the system public key pk s =gs ∈G . compute the identity-based private key,
Figure PCTCN2020127985-appb-000008
The output system public parameters are
Figure PCTCN2020127985-appb-000009
G,G T都是阶数为q的乘法循环群,q是一个大素数;P为G的生成元;pk s是系统公钥;g s是指数运算;id t是可信机构的身份标识符;e是双线性映射操作。 G, G T are multiplicative cyclic groups of order q, q is a large prime number; P is the generator of G; pk s is the public key of the system; g s is the exponential operation; id t is the identity of the trusted organization operator; e is the bilinear mapping operation.
S214:生成布隆过滤器。S214: Generate a Bloom filter.
布隆过滤器技术(Bloom Filter)是一种空间效率很高的随机数据结构,它利用位数组很简洁地表示一个集合,并能判断一个元素是否属于这个集合。Bloom filter technology (Bloom Filter) is a random data structure with high space efficiency.
请一并参阅图3和图4,图3是布隆过滤器进行数据存储时的结构示意图,图4是布隆过滤器进行数据查询时的结构示意图。比特串长 度为b,哈希函数H的数目为k。Please refer to FIG. 3 and FIG. 4 together. FIG. 3 is a schematic diagram of the structure when the Bloom filter performs data storage, and FIG. 4 is a schematic diagram of the structure when the Bloom filter performs data query. The length of the bit string is b, and the number of hash functions H is k.
数据存储:初始状态时,Bloom Filter是一个包含m位的位数组,每一位都置为0。为了表达S={x 1,x 2,...,x n}这样一个n个元素的集合,Bloom Filter使用k个相互独立的哈希函数,它们分别将集合中的每个元素映射到{1,2,...,m}的范围中。对任意一个元素x,第i个哈希函数映射的位置h i(x)就会被置为1(1≤i≤k)。注意,如果一个位置多次被置为1,那么只有第一次会起作用。例如在图2中,有两个哈希函数选中同一个比特位置(从左边数第五位)。 Data storage: In the initial state, Bloom Filter is a bit array containing m bits, and each bit is set to 0. In order to express a set of n elements such as S = {x 1 , x 2 , ..., x n }, Bloom Filter uses k independent hash functions, which respectively map each element in the set to { 1, 2, ..., m} in the range. For any element x, the position h i (x) of the ith hash function map will be set to 1 (1≤i≤k). Note that if a position is set to 1 multiple times, only the first time will work. For example, in Figure 2, there are two hash functions that select the same bit position (fifth from the left).
数据查询:在判断y是否属于这个集合时,我们对元素y应用k次哈希函数,如果所有h i(y)就都设为1(1≤i≤k),那么我们就认为y是集合S中的元素,否则就认为y不是该集合中的元素。图3中y 1就不是集合中的元素。y 2则在特定误警概率前提下属于这个集合。 Data query: When judging whether y belongs to this set, we apply the hash function k times to the element y. If all h i (y) are set to 1 (1≤i≤k), then we consider y to be a set element in S, otherwise it is considered that y is not an element in the set. In Figure 3, y 1 is not an element in the set. y 2 belongs to this set under the premise of a certain false alarm probability.
S215:生成可信机构与服务提供商身份之间的服务提供商公钥和服务提供商私钥。S215: Generate the service provider public key and the service provider private key between the trusted authority and the service provider identity.
可信机构发送至服务提供商身份的基于身份的第一私钥,将第一随机数作为第二私钥,生成第一公钥。服务提供商身份秘密选择的第一秘密随机数。The trusted authority sends the identity-based first private key of the service provider's identity, and uses the first random number as the second private key to generate the first public key. The first secret random number chosen by the service provider identity secret.
具体来说,对于一个服务提供商id a(身份),可信机构计算基于身份的第一私钥,
Figure PCTCN2020127985-appb-000010
并将
Figure PCTCN2020127985-appb-000011
发送至服务提供商id a。同时,选择第一随机数
Figure PCTCN2020127985-appb-000012
作为第二私钥,并生成第一公钥
Figure PCTCN2020127985-appb-000013
另一方面,服务提供商id a秘密选择一个随机数t a
Specifically, for a service provider id a (identity), the trusted authority computes the identity-based first private key,
Figure PCTCN2020127985-appb-000010
and will
Figure PCTCN2020127985-appb-000011
Sent to service provider id a . At the same time, select the first random number
Figure PCTCN2020127985-appb-000012
as the second private key and generate the first public key
Figure PCTCN2020127985-appb-000013
On the other hand, the service provider id a secretly chooses a random number t a .
S216:生成可信机构与每个用户之间的用户公钥和用户私钥。S216: Generate the user public key and the user private key between the trusted authority and each user.
基于哈希链生成一系列匿名函数、匿名身份。用户身份将匿名身份发送至可信机构生成第一签名。用户身份获取可信机构发送的基于身份的第三私钥。用户身份将第二随机数作为第四私钥,并生成与第四私钥关联的第二公钥。Generate a series of anonymous functions and anonymous identities based on the hash chain. The user identity sends the anonymous identity to the trusted authority to generate the first signature. The user identity obtains the identity-based third private key sent by the trusted authority. The user identity uses the second random number as the fourth private key and generates a second public key associated with the fourth private key.
具体来说,对于每一个用户id v,利用一个哈希链生成一系列匿名H m(s i)=H(H(...H(s i))),并生成匿名身份pid i,j=H m+1-j(s i),j∈{1,2,...,m},其中m为哈希链的长度。同时,用户将匿名身份pid i,1发送至可信机构,生成第一签名σ i=pid i,j/(s+H(id t))·P∈G。另一方面,可信机构将第三私钥
Figure PCTCN2020127985-appb-000014
发送至用户。用户id i选择第二随机数
Figure PCTCN2020127985-appb-000015
作为第四私钥,并生成相应的第二公钥
Figure PCTCN2020127985-appb-000016
Specifically, for each user id v , use a hash chain to generate a series of anonymous H m (s i )=H(H(...H(s i ))), and generate anonymous identities pid i,j =H m+1-j (s i ), j∈{1,2,...,m}, where m is the length of the hash chain. At the same time, the user sends the anonymous identity pid i,1 to the trusted authority, and generates a first signature σ i =pid i,j /(s+H(id t ))·P∈G. On the other hand, the trusted authority will put the third private key
Figure PCTCN2020127985-appb-000014
sent to the user. User id i selects the second random number
Figure PCTCN2020127985-appb-000015
as the fourth private key, and generate the corresponding second public key
Figure PCTCN2020127985-appb-000016
S22:获取用户与服务提供商之间的服务请求阶段信息。S22: Acquire the service request stage information between the user and the service provider.
在一具体实施例中,包括下述步骤S221~S224:In a specific embodiment, the following steps S221-S224 are included:
S221:用户身份根据匿名身份和第三随机数生成第一签名对,根据第一签名对生成服务请求消息。S221: The user identity generates a first signature pair according to the anonymous identity and the third random number, and generates a service request message according to the first signature pair.
当用户id i想向服务商id a请求服务时,用户id i利用匿名身份pid i,j,选择第三随机数
Figure PCTCN2020127985-appb-000017
生成相应的第一签名对
Figure PCTCN2020127985-appb-000018
如公式(4)所示:
When the user id i wants to request service from the service provider id a , the user id i uses the anonymous identity pid i,j to select the third random number
Figure PCTCN2020127985-appb-000017
Generate the corresponding first signature pair
Figure PCTCN2020127985-appb-000018
As shown in formula (4):
Figure PCTCN2020127985-appb-000019
Figure PCTCN2020127985-appb-000019
用户id i生成并发送服务请求消息
Figure PCTCN2020127985-appb-000020
至服务商id a
User id i generates and sends a service request message
Figure PCTCN2020127985-appb-000020
to the service provider id a .
S222:用户身份向服务供应商身份发送服务请求消息。S222: The user identity sends a service request message to the service provider identity.
用户id i生成并发送服务请求消息
Figure PCTCN2020127985-appb-000021
至服务商id a
User id i generates and sends a service request message
Figure PCTCN2020127985-appb-000021
to the service provider id a .
S223:用户身份验证匿名身份和第一签名的正确性,并进行双线性计算得到计算结果。S223: The user identity verifies the correctness of the anonymous identity and the first signature, and performs bilinear calculation to obtain the calculation result.
用户id i验证(pid i,j,σ i)的正确性,并计算公式(5): User id i verifies the correctness of (pid i, j , σ i ), and calculates formula (5):
Figure PCTCN2020127985-appb-000022
Figure PCTCN2020127985-appb-000022
S224:若计算结果正确,服务供应商身份接受服务请求。S224: If the calculation result is correct, the service provider identity accepts the service request.
若公式(5)计算正确,服务商id a接受用户身份发送的服务请求。 If the formula (5) is calculated correctly, the service provider id a accepts the service request sent by the user identity.
S23:基于区块链技术对用户与服务提供商之间的数据进行收集。S23: Collect data between users and service providers based on blockchain technology.
在一具体实施例中,包括下述步骤S231~S238:In a specific embodiment, the following steps S231-S238 are included:
S231:用户身份选择第四随机数生成密文,以对车辆数据进行加密。S231: The user identity selects a fourth random number to generate a ciphertext to encrypt the vehicle data.
为了加密车辆数据data i,用户id i选择第四随机数
Figure PCTCN2020127985-appb-000023
生成密文,如公式(6)所示:
In order to encrypt the vehicle data data i , the user id i selects a fourth random number
Figure PCTCN2020127985-appb-000023
Generate ciphertext, as shown in formula (6):
Figure PCTCN2020127985-appb-000024
Figure PCTCN2020127985-appb-000024
S232:用户身份选择第五随机数生成车辆数据的第二签名对,以保证车辆数据的正确性。S232: The user identity selects the fifth random number to generate the second signature pair of the vehicle data, so as to ensure the correctness of the vehicle data.
为了保证数据data i的正确性,用户id i选择一个随机数
Figure PCTCN2020127985-appb-000025
并生成第二签名对,如公式(7)所示:
In order to ensure the correctness of the data data i , the user id i selects a random number
Figure PCTCN2020127985-appb-000025
And generate the second signature pair, as shown in formula (7):
Figure PCTCN2020127985-appb-000026
Figure PCTCN2020127985-appb-000026
S233:用户身份将第二签名对发送至车辆身份,并验证第二签名对的真实性。S233: The user identity sends the second signature pair to the vehicle identity, and verifies the authenticity of the second signature pair.
用户id i将签名
Figure PCTCN2020127985-appb-000027
发送至车辆id v,如公式(8)所示,并验证其真实性:
user id i will sign
Figure PCTCN2020127985-appb-000027
sent to the vehicle id v , as shown in equation (8), and verify its authenticity:
Figure PCTCN2020127985-appb-000028
Figure PCTCN2020127985-appb-000028
S234:车辆身份根据密文和第二签名对生成车辆消息,将车辆消息发送至服务提供商身份。S234: The vehicle identity generates a vehicle message according to the ciphertext and the second signature pair, and sends the vehicle message to the service provider identity.
当验证结果为真实时,车辆id v根据密文和第二签名对生成车辆消息
Figure PCTCN2020127985-appb-000029
并将其传送至服务商id a
When the verification result is true, the vehicle id v generates the vehicle message according to the ciphertext and the second signature pair
Figure PCTCN2020127985-appb-000029
and send it to the service provider id a .
S235:服务提供商身份对匿名身份和第二签名对进行合并处理。S235: The service provider identity performs merge processing on the anonymous identity and the second signature pair.
服务商id a合并匿名身份pid i,j和数据data i的第二签名,如公式(9)所示: The service provider id a combines the anonymous identities pid i, j and the second signature of the data data i , as shown in formula (9):
Figure PCTCN2020127985-appb-000030
Figure PCTCN2020127985-appb-000030
S236:服务提供商身份收集至少一个用户身份的车辆数据,基于不经意传输协议将至少一个用户身份的车辆数据和第二签名发布在区块上,服务提供商身份将至少一个用户身份的匿名身份插入布隆过滤器。S236: The service provider identity collects the vehicle data of the at least one user identity, publishes the vehicle data of the at least one user identity and the second signature on the block based on the inadvertent transmission protocol, and the service provider identity inserts the anonymous identity of the at least one user identity into the block. Bloom filter.
服务商id a收集k个用户的车辆数据,并利用OT(Oblivious Transfer,不经意传输)协议将多个用户的车辆数据以及签名发布在区块上,同时服务商id a将k个用户的匿名插入布隆过滤器BF a,通过布隆过滤器进行匿名数据检索。其中,布隆过滤器进行初步用户的定位,OT协议进行内容获取。 The service provider id a collects the vehicle data of k users, and uses the OT (Oblivious Transfer) protocol to publish the vehicle data and signatures of multiple users on the block. At the same time, the service provider id a inserts the anonymous data of the k users into the block. Bloom filter BF a , anonymous data retrieval by Bloom filter. Among them, the Bloom filter performs preliminary user positioning, and the OT protocol performs content acquisition.
S237:服务提供商身份在每个车辆数据的发布周期,生成一个新 的交易,并将交易发送至服务提供商身份。S237: The service provider identity generates a new transaction in each vehicle data release cycle, and sends the transaction to the service provider identity.
在每个数据发布周期,服务商id a生成一个新的交易,并将新交易发送至所有服务商,如表一所示,其中c为用户密文。交易包括第一主体,第一主体包括第一时间戳和服务提供商身份身份。 In each data release cycle, the service provider id a generates a new transaction and sends the new transaction to all service providers, as shown in Table 1, where c is the user ciphertext. The transaction includes a first subject including a first timestamp and a service provider identity.
表一Table I
Figure PCTCN2020127985-appb-000031
Figure PCTCN2020127985-appb-000031
S238:服务提供商身份利用共识机制生成新的区块。S238: The service provider identity uses the consensus mechanism to generate a new block.
所有服务商利用共识机制生成新的区块,如表二所示。区块包括第二主体,第二主体包括第二时间戳、主服务商身份、前区块摘要和权益证明。All service providers use the consensus mechanism to generate new blocks, as shown in Table 2. The block includes a second body, and the second body includes a second timestamp, the identity of the primary service provider, a digest of the previous block, and a proof of stake.
表二Table II
Figure PCTCN2020127985-appb-000032
Figure PCTCN2020127985-appb-000032
S24:基于不经意传输协议实现服务提供商对用户的数据查询。S24: Realize the data query of the user by the service provider based on the inadvertent transmission protocol.
在一具体实施例中,包括下述步骤S241~S242:In a specific embodiment, the following steps S241-S242 are included:
S241:服务提供商身份将查询的用户的过往匿名身份插入区块链,得到至少一个过往交易。S241: The service provider identity inserts the past anonymous identity of the queried user into the blockchain to obtain at least one past transaction.
例如,服务商id b想要查询给定用户id i在链上记录的数据,服务商id b首先利用用户id i的过往匿名{pid i,1,......,pid i,j}插入区块链,并找到相应的交易。 For example, if the service provider id b wants to query the data recorded on the chain for a given user id i , the service provider id b first uses the past anonymity of the user id i {pid i, 1 , ..., pid i, j } Insert the blockchain and find the corresponding transaction.
S242:基于不经意传输协议获得至少一个过往交易关联的密文组和签名组,获得以及验证聚合结果。S242: Obtain at least one ciphertext group and signature group associated with the past transaction based on the inadvertent transmission protocol, and obtain and verify the aggregation result.
利用不经意传输协议获得相应的密文
Figure PCTCN2020127985-appb-000033
以及相应的签名
Figure PCTCN2020127985-appb-000034
并获得以及验证聚合结果
Figure PCTCN2020127985-appb-000035
Obtain the corresponding ciphertext using the inadvertent transmission protocol
Figure PCTCN2020127985-appb-000033
and the corresponding signature
Figure PCTCN2020127985-appb-000034
and get and verify aggregated results
Figure PCTCN2020127985-appb-000035
本申请中揭示的技术方案,为了实现车载传感器数据的隐私采集和数据聚合,设计一种基于Modified Paillier同态加密算法和一种基于身份的加密签名方案,实现车辆数据的隐私数据保护和可验证性。同时,根据聚合结果,可以反映一个用户对驾驶行为和习惯;利用基于权益证明作为共识机制的区块链技术来对用户驾驶行为的密文数据和签名的聚合结果进行发布,并在区块生成时,参与的生成节点通过签名验证来保证发布数据的正确性。In the technical solution disclosed in this application, in order to realize the privacy collection and data aggregation of vehicle sensor data, a Modified Paillier homomorphic encryption algorithm and an identity-based encryption signature scheme are designed to realize the privacy data protection and verifiability of vehicle data. sex. At the same time, according to the aggregated results, a user's driving behavior and habits can be reflected; using blockchain technology based on proof of stake as a consensus mechanism to publish the aggregated results of the ciphertext data and signatures of the user's driving behavior, and generate them in blocks , the participating generation nodes ensure the correctness of the published data through signature verification.
对车联网区块链场景而言,具有以下技术效果:第一,区块链上记录的数据需要一方面保持区块链中数据的保密性,保障了分享数据内容的隐私;第二,由于车联网数据与交通安全中的客户利益相关,保证了区块链上分享数据的真实性;第三,能够在不泄露数据生产者的前提下,在区块链上找到目标生产者的数据。For the Internet of Vehicles blockchain scenario, it has the following technical effects: First, the data recorded on the blockchain needs to maintain the confidentiality of the data in the blockchain on the one hand, which ensures the privacy of the shared data content; The data of the Internet of Vehicles is related to the interests of customers in traffic safety, which ensures the authenticity of the data shared on the blockchain; thirdly, the data of the target producer can be found on the blockchain without revealing the data producer.
本实施例基于同态加密算法对数据进行发布,能够保证链上发布数据的保密性;利用一种基于身份的加密签名方案,对发布数据的正确性进行验证;通过布隆过滤器进行匿名数据检索;利用不经意传输协议,对目标密文进行获取。This embodiment publishes data based on the homomorphic encryption algorithm, which can ensure the confidentiality of the published data on the chain; an identity-based encryption signature scheme is used to verify the correctness of the published data; anonymized data is performed through a Bloom filter Retrieval; use inadvertent transmission protocol to obtain the target ciphertext.
本申请提供一种基于隐私区块链的车联网保护方法,该方法包括:基于同态加密算法进行初始化处理;获取用户与服务提供商之间的服务请求阶段信息;基于区块链技术对用户与服务提供商之间的数据进行收集;基于不经意传输协议实现服务提供商对用户的数据查询。通过基于同态加密算法对系统进行初始化,并对数据进行发布,以保证区块链上发布数据的保密性,在服务请求阶段获取用户与服务提供商之间的信息,在数据查询阶段,基于区块链技术对用户与服务提供商之间的数据进行收集,在数据获取接端,利用不经意传输协议,对目标密文进行获取,实现服务提供商对用户的数据查询,能够保证车联网数据隐私和验证数据的准确性。The present application provides a method for protecting the Internet of Vehicles based on privacy blockchain, the method includes: initializing processing based on a homomorphic encryption algorithm; obtaining service request stage information between a user and a service provider; Data collection with service providers; based on inadvertent transmission protocol to realize service provider's data query of users. The system is initialized based on the homomorphic encryption algorithm, and the data is released to ensure the confidentiality of the data published on the blockchain. In the service request stage, the information between the user and the service provider is obtained. In the data query stage, based on Blockchain technology collects data between users and service providers. At the data acquisition terminal, inadvertent transmission protocols are used to obtain the target ciphertext, so that service providers can query users' data and ensure the data of the Internet of Vehicles. Privacy and Verification of Data Accuracy.
对应上述的方法,本申请提出一种移动终端,请参阅图5,图5是本申请一种移动终端一实施例的结构示意图。本申请揭示的移动终端100包括相互耦接的存储器12和处理器14,存储器12用于存储计算机程序,处理器14用于执行计算机程序实现上述实施方式中任一项方法的步骤。Corresponding to the above method, the present application proposes a mobile terminal. Please refer to FIG. 5 , which is a schematic structural diagram of an embodiment of a mobile terminal of the present application. The mobile terminal 100 disclosed in the present application includes a memory 12 and a processor 14 coupled to each other, the memory 12 is used for storing a computer program, and the processor 14 is used for executing the computer program to implement the steps of any of the methods in the foregoing embodiments.
具体来说,处理器14用于:Specifically, processor 14 is used to:
基于同态加密算法进行初始化处理。Initialization processing based on homomorphic encryption algorithm.
获取用户与服务提供商之间的服务请求阶段信息。Get service request stage information between user and service provider.
基于区块链技术对用户与服务提供商之间的数据进行收集。The data between users and service providers is collected based on blockchain technology.
基于不经意传输协议实现服务提供商对用户的数据查询。The service provider's data query to the user is realized based on the casual transmission protocol.
本实施例移动终端100保证车联网数据隐私和验证数据的准确性。The mobile terminal 100 in this embodiment ensures the privacy of the Internet of Vehicles data and the accuracy of the verification data.
在本申请所提供的几个实施方式中,应该理解到本申请所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施方式仅仅是示意性的,例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连 接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the systems, devices and methods disclosed in this application may be implemented in other ways. For example, the device implementations described above are only illustrative. For example, the division of the modules or units is only a logical function division. In actual implementation, there may be other divisions. For example, multiple units or components may be Incorporation may either be integrated into another system, or some features may be omitted, or not implemented. On the other hand, the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施方式方案的目的。The units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this implementation manner.
另外,在本申请各个实施方式中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit. The above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units.
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器(processor)执行本申请各个实施方式所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。The integrated unit, if implemented in the form of a software functional unit and sold or used as an independent product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solutions of the present application can be embodied in the form of software products in essence, or the parts that contribute to the prior art, or all or part of the technical solutions, and the computer software products are stored in a storage medium , including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor (processor) to execute all or part of the steps of the methods described in the various embodiments of the present application. The aforementioned storage medium includes: U disk, mobile hard disk, Read-Only Memory (ROM, Read-Only Memory), Random Access Memory (RAM, Random Access Memory), magnetic disk or optical disk and other media that can store program codes .
以上仅为本申请的实施方式,并非因此限制本申请的专利范围,凡是利用本申请说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本申请的专利保护范围内。The above are only the embodiments of the present application, and are not intended to limit the scope of the patent of the present application. Any equivalent structure or equivalent process transformation made by using the contents of the description and drawings of the present application, or directly or indirectly applied in other related technical fields, All are similarly included in the scope of patent protection of the present application.

Claims (10)

  1. 一种基于隐私区块链的车联网保护方法,其特征在于,所述方法包括:A method for protecting the Internet of Vehicles based on a privacy blockchain, characterized in that the method includes:
    基于同态加密算法进行初始化处理;Initialize processing based on homomorphic encryption algorithm;
    获取用户与服务提供商之间的服务请求阶段信息;Obtain service request stage information between the user and the service provider;
    基于区块链技术对所述用户与所述服务提供商之间的数据进行收集;Collect data between the user and the service provider based on blockchain technology;
    基于不经意传输协议实现所述服务提供商对所述用户的数据查询。The data query of the user by the service provider is implemented based on a casual transfer protocol.
  2. 根据权利要求1所述的方法,其特征在于,基于同态加密算法进行初始化处理的步骤包括:The method according to claim 1, wherein the step of performing initialization processing based on a homomorphic encryption algorithm comprises:
    预设第一安全参数,所述可信机构对同态加密系统进行初始化,生成两个大素数,并根据两个所述大素数计算公钥;Presetting the first security parameter, the trusted organization initializes the homomorphic encryption system, generates two large prime numbers, and calculates the public key according to the two large prime numbers;
    预设第二安全参数,生成双线性参数;Preset the second security parameter to generate bilinear parameters;
    根据哈希函数和预设系统私钥,生成系统公钥、基于身份的私钥和系统公开参数;According to the hash function and the preset system private key, generate the system public key, identity-based private key and system public parameters;
    生成布隆过滤器;generate bloom filter;
    生成所述可信机构与所述服务提供商身份之间的服务提供商公钥 和服务提供商私钥;generating a service provider public key and a service provider private key between the trusted authority and the service provider identity;
    生成所述可信机构与每个所述用户之间的用户公钥和用户私钥。A user public key and a user private key between the trusted authority and each of the users are generated.
  3. 根据权利要求2所述的方法,其特征在于,生成所述可信机构与所述服务提供商身份之间的服务提供商公钥和服务提供商私钥的步骤包括:The method according to claim 2, wherein the step of generating a service provider public key and a service provider private key between the trusted authority and the service provider identity comprises:
    所述可信机构发送至服务提供商身份的基于身份的第一私钥,将第一随机数作为第二私钥,生成第一公钥;The trusted organization sends the identity-based first private key of the service provider identity, and uses the first random number as the second private key to generate the first public key;
    所述服务提供商身份秘密选择的第一秘密随机数。The first secret random number secretly selected by the service provider identity.
  4. 根据权利要求3所述的方法,其特征在于,生成所述可信机构与每个所述用户之间的用户公钥和用户私钥的步骤包括:The method according to claim 3, wherein the step of generating a user public key and a user private key between the trusted authority and each of the users comprises:
    基于哈希链生成一系列匿名函数、匿名身份;Generate a series of anonymous functions and anonymous identities based on the hash chain;
    用户身份将所述匿名身份发送至所述可信机构生成第一签名;The user identity sends the anonymous identity to the trusted authority to generate a first signature;
    所述用户身份获取所述可信机构发送的基于身份的第三私钥;The user identity obtains the identity-based third private key sent by the trusted authority;
    所述用户身份将第二随机数作为第四私钥,并生成与所述第四私钥关联的第二公钥。The user identity uses the second random number as a fourth private key, and generates a second public key associated with the fourth private key.
  5. 根据权利要求4所述的方法,其特征在于,获取用户与服务提供商之间的服务请求阶段信息的步骤包括:The method according to claim 4, wherein the step of obtaining the service request stage information between the user and the service provider comprises:
    所述用户身份根据所述匿名身份和第三随机数生成第一签名对,根据所述第一签名对生成服务请求消息;The user identity generates a first signature pair according to the anonymous identity and the third random number, and generates a service request message according to the first signature pair;
    所述用户身份向所述服务供应商身份发送所述服务请求消息;the user identity sends the service request message to the service provider identity;
    所述用户身份验证所述匿名身份和所述第一签名的正确性,并进行双线性计算得到计算结果;The user identity verifies the correctness of the anonymous identity and the first signature, and performs bilinear calculation to obtain a calculation result;
    若所述计算结果正确,所述服务供应商身份接受所述服务请求。If the calculation result is correct, the service provider identity accepts the service request.
  6. 根据权利要求5所述的方法,其特征在于,基于区块链技术对所述用户与所述服务提供商之间的数据进行收集的步骤包括:The method according to claim 5, wherein the step of collecting data between the user and the service provider based on the blockchain technology comprises:
    所述用户身份选择第四随机数生成密文,以对车辆数据进行加密;The user identity selects a fourth random number to generate ciphertext to encrypt vehicle data;
    所述用户身份选择第五随机数生成所述车辆数据的第二签名对,以保证所述车辆数据的正确性;The user identity selects a fifth random number to generate a second signature pair of the vehicle data, so as to ensure the correctness of the vehicle data;
    所述用户身份将所述第二签名对发送至车辆身份,并验证所述第二签名对的真实性;the user identity sends the second signature pair to the vehicle identity and verifies the authenticity of the second signature pair;
    所述车辆身份根据所述密文和所述第二签名对生成车辆消息,将所述车辆消息发送至所述服务提供商身份;the vehicle identity generates a vehicle message according to the ciphertext and the second signature pair, and sends the vehicle message to the service provider identity;
    所述服务提供商身份对匿名身份和所述第二签名对进行合并处理;The service provider identity is combined with the anonymous identity and the second signature pair;
    所述服务提供商身份收集至少一个所述用户身份的所述车辆数据,基于不经意传输协议将至少一个所述用户身份的所述车辆数据和所述第二签名发布在区块上,所述服务提供商身份将至少一个所述用 户身份的匿名身份插入所述布隆过滤器;The service provider identity collects the vehicle data of at least one of the user identities, publishes the vehicle data of at least one of the user identities and the second signature on a block based on an oblivious transfer protocol, the service a provider identity inserts an anonymous identity of at least one of said user identities into said bloom filter;
    所述服务提供商身份在每个所述车辆数据的发布周期,生成一个新的交易,并将所述交易发送至所述服务提供商身份;The service provider identity generates a new transaction in each release cycle of the vehicle data, and sends the transaction to the service provider identity;
    所述服务提供商身份利用共识机制生成新的区块。The service provider identity generates new blocks using a consensus mechanism.
  7. 根据权利要求6所述的方法,其特征在于,所述交易包括第一主体,所述第一主体包括第一时间戳和所述服务提供商身份身份;所述区块包括第二主体,所述第二主体包括第二时间戳、主服务商身份、前区块摘要和权益证明。The method of claim 6, wherein the transaction includes a first subject, the first subject includes a first timestamp and the service provider identity; the block includes a second subject, the The second subject includes the second timestamp, the identity of the main service provider, the previous block digest and the proof of rights and interests.
  8. 根据权利要求1所述的方法,其特征在于,基于不经意传输协议实现所述服务提供商对所述用户的数据查询的步骤包括:The method according to claim 1, wherein the step of realizing the data query of the user by the service provider based on a casual transmission protocol comprises:
    所述服务提供商身份将查询的所述用户的过往匿名身份插入区块链,得到至少一个过往交易;The service provider identity inserts the queried past anonymous identity of the user into the blockchain to obtain at least one past transaction;
    基于所述不经意传输协议获得至少一个所述过往交易关联的密文组和签名组,获得以及验证聚合结果。Obtain at least one ciphertext group and signature group associated with the past transaction based on the inadvertent transmission protocol, and obtain and verify an aggregated result.
  9. 一种移动终端,其特征在于,所述移动终端包括相互耦接的处理器和存储器,所述存储器用于存储计算机程序,所述处理器用于加载所述计算机程序并执行。A mobile terminal, characterized in that the mobile terminal includes a processor and a memory coupled to each other, the memory is used for storing a computer program, and the processor is used for loading and executing the computer program.
  10. 一种计算机存储介质,其上存有计算机程序,其特征在于,所述计算机程序用于实现上述权利要求1~8中任一项方法的步骤。A computer storage medium on which a computer program is stored, characterized in that the computer program is used to implement the steps of the method in any one of the preceding claims 1-8.
PCT/CN2020/127985 2020-10-22 2020-11-11 Privacy blockchain-based internet of vehicles protection method, and mobile terminal WO2022082893A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011142460.XA CN112367305B (en) 2020-10-22 2020-10-22 Internet of vehicles protection method based on privacy block chain and mobile terminal
CN202011142460.X 2020-10-22

Publications (1)

Publication Number Publication Date
WO2022082893A1 true WO2022082893A1 (en) 2022-04-28

Family

ID=74511724

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/127985 WO2022082893A1 (en) 2020-10-22 2020-11-11 Privacy blockchain-based internet of vehicles protection method, and mobile terminal

Country Status (2)

Country Link
CN (1) CN112367305B (en)
WO (1) WO2022082893A1 (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114867014A (en) * 2022-05-07 2022-08-05 华中师范大学 Internet of vehicles access control method, system, medium, equipment and terminal
CN114944953A (en) * 2022-05-20 2022-08-26 江苏大学 Certificateless anonymous authentication method for road condition monitoring in Internet of vehicles environment
CN114944914A (en) * 2022-06-01 2022-08-26 电子科技大学 Internet of vehicles data security sharing and privacy protection method based on secret sharing
CN114978620A (en) * 2022-05-07 2022-08-30 中移互联网有限公司 Encryption method and decryption method for identification number
CN114978687A (en) * 2022-05-20 2022-08-30 江苏大学 Efficient anonymous authentication method based on block chain technology in Internet of vehicles environment
CN115062063A (en) * 2022-07-28 2022-09-16 恒生电子股份有限公司 Data query method and device based on block chain
CN115118441A (en) * 2022-08-29 2022-09-27 中航信移动科技有限公司 Identity verification system based on block chain
CN115200603A (en) * 2022-09-13 2022-10-18 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) Navigation service privacy protection method and device based on homomorphic encryption and anonymous camouflage
CN115396148A (en) * 2022-07-22 2022-11-25 西安邮电大学 Privacy protection list query method, system, medium, equipment and terminal
CN115426117A (en) * 2022-08-26 2022-12-02 湖南大学 Multi-source aggregation query verification method
CN115941332A (en) * 2022-12-08 2023-04-07 南京航空航天大学 Vehicle credibility measuring method based on block chain and recommendation trust
CN116015738A (en) * 2022-12-05 2023-04-25 北京航空航天大学 Privacy-protected anonymous network node query method, device, equipment and medium
CN116170131A (en) * 2023-04-20 2023-05-26 浪潮(北京)电子信息产业有限公司 Ciphertext processing method, ciphertext processing device, storage medium and trusted execution device
CN116527276A (en) * 2023-05-16 2023-08-01 合肥工业大学 Efficient privacy protection method for traffic monitoring service of Internet of vehicles
CN117118592A (en) * 2023-10-25 2023-11-24 北京航空航天大学 Method and system for selecting Internet of vehicles client based on homomorphic encryption algorithm
CN117201019A (en) * 2023-11-03 2023-12-08 北京航空航天大学 Vehicle message verification method, system and storage medium based on blockchain
CN117827884A (en) * 2023-12-31 2024-04-05 北京海泰方圆科技股份有限公司 Batch data query method and device
CN118014742A (en) * 2024-04-08 2024-05-10 杭州大鱼网络科技有限公司 Insurance identity information transmission protection method and system
CN118158662A (en) * 2024-05-09 2024-06-07 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) Method for realizing position privacy protection in satellite vehicle networking

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112966022B (en) * 2021-03-10 2024-04-05 安徽航天信息科技有限公司 Information query method, device and system of data transaction platform
CN113515716B (en) * 2021-04-06 2023-06-09 湖北工业大学 Target pattern matching system and method with privacy protection function
CN114338038B (en) * 2021-12-27 2023-06-23 内蒙古科技大学 Storage system for secret inquiry of block chain data and careless transmission method
CN114357492B (en) * 2022-01-10 2024-06-25 天津大学 Medical data privacy fusion method and device based on blockchain
CN114726503B (en) * 2022-03-30 2024-06-18 北京理工大学 Privacy protection data subscription method in blockchain Internet of vehicles
CN114841818B (en) * 2022-04-18 2023-06-16 北京交通大学 Customized car insurance bidding privacy protection method based on cross-chain technology

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107347096A (en) * 2017-07-07 2017-11-14 安徽大学 Location privacy protection method based on cloud server
CN110365485A (en) * 2019-06-20 2019-10-22 北京理工大学 A kind of privacy of user protection scheme of the about vehicle based on block chain
US10691754B1 (en) * 2015-07-17 2020-06-23 Hrl Laboratories, Llc STAGS: secure, tunable, and accountable generic search in databases

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101321080B1 (en) * 2012-06-22 2013-10-23 순천향대학교 산학협력단 Method of message batch verification scheme using bloom filter in vanet
US9288048B2 (en) * 2013-09-24 2016-03-15 The Regents Of The University Of Michigan Real-time frame authentication using ID anonymization in automotive networks
CN110375740B (en) * 2019-06-27 2021-03-19 香港中文大学(深圳) Vehicle navigation method, device, equipment and storage medium
CN110677256B (en) * 2019-09-24 2022-08-16 东北大学 VPKI-based VANETs pseudonym revocation system and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10691754B1 (en) * 2015-07-17 2020-06-23 Hrl Laboratories, Llc STAGS: secure, tunable, and accountable generic search in databases
CN107347096A (en) * 2017-07-07 2017-11-14 安徽大学 Location privacy protection method based on cloud server
CN110365485A (en) * 2019-06-20 2019-10-22 北京理工大学 A kind of privacy of user protection scheme of the about vehicle based on block chain

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
KONG QINGLEI; SU LE; MA MAODE: "Achieving Privacy-Preserving and Verifiable Data Sharing in Vehicular Fog With Blockchain", IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, IEEE, PISCATAWAY, NJ, USA, vol. 22, no. 8, 16 April 2020 (2020-04-16), Piscataway, NJ, USA , pages 4889 - 4898, XP011871466, ISSN: 1524-9050, DOI: 10.1109/TITS.2020.2983466 *
WANG RUIJIN, TANG YUCHENG;ZHANG WEIQI;ZHANG FENGLI: "Privacy protection scheme for internet of vehicles based on homomorphic encryption and block chain technology", CHINESE JOURNAL OF NETWORK AND INFORMATION SECURITY, vol. 6, no. 1, 28 February 2020 (2020-02-28), pages 46 - 53, XP055922821, ISSN: 2096-109x, DOI: 10.11959/j.issn.2096−109x.2020011 *

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114978620B (en) * 2022-05-07 2023-07-21 中移互联网有限公司 Encryption method and decryption method for identity identification number
CN114867014B (en) * 2022-05-07 2024-04-19 华中师范大学 Internet of vehicles access control method, system, medium, equipment and terminal
CN114867014A (en) * 2022-05-07 2022-08-05 华中师范大学 Internet of vehicles access control method, system, medium, equipment and terminal
CN114978620A (en) * 2022-05-07 2022-08-30 中移互联网有限公司 Encryption method and decryption method for identification number
CN114944953B (en) * 2022-05-20 2024-04-09 江苏大学 Certificate-free anonymous authentication method for road condition monitoring in Internet of vehicles environment
CN114978687A (en) * 2022-05-20 2022-08-30 江苏大学 Efficient anonymous authentication method based on block chain technology in Internet of vehicles environment
CN114978687B (en) * 2022-05-20 2024-04-09 江苏大学 Efficient anonymous authentication method based on blockchain technology in Internet of vehicles environment
CN114944953A (en) * 2022-05-20 2022-08-26 江苏大学 Certificateless anonymous authentication method for road condition monitoring in Internet of vehicles environment
CN114944914A (en) * 2022-06-01 2022-08-26 电子科技大学 Internet of vehicles data security sharing and privacy protection method based on secret sharing
CN115396148B (en) * 2022-07-22 2024-04-12 西安邮电大学 Privacy-protected list query method, system, medium, equipment and terminal
CN115396148A (en) * 2022-07-22 2022-11-25 西安邮电大学 Privacy protection list query method, system, medium, equipment and terminal
CN115062063A (en) * 2022-07-28 2022-09-16 恒生电子股份有限公司 Data query method and device based on block chain
CN115426117A (en) * 2022-08-26 2022-12-02 湖南大学 Multi-source aggregation query verification method
CN115426117B (en) * 2022-08-26 2024-04-26 湖南大学 Multisource aggregation query verification method
CN115118441B (en) * 2022-08-29 2022-11-04 中航信移动科技有限公司 Identity verification system based on block chain
CN115118441A (en) * 2022-08-29 2022-09-27 中航信移动科技有限公司 Identity verification system based on block chain
CN115200603B (en) * 2022-09-13 2023-01-31 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) Navigation service privacy protection method and device based on homomorphic encryption and anonymous camouflage
CN115200603A (en) * 2022-09-13 2022-10-18 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) Navigation service privacy protection method and device based on homomorphic encryption and anonymous camouflage
CN116015738A (en) * 2022-12-05 2023-04-25 北京航空航天大学 Privacy-protected anonymous network node query method, device, equipment and medium
CN116015738B (en) * 2022-12-05 2024-04-12 北京航空航天大学 Privacy-protected anonymous network node query method, device, equipment and medium
CN115941332A (en) * 2022-12-08 2023-04-07 南京航空航天大学 Vehicle credibility measuring method based on block chain and recommendation trust
CN116170131A (en) * 2023-04-20 2023-05-26 浪潮(北京)电子信息产业有限公司 Ciphertext processing method, ciphertext processing device, storage medium and trusted execution device
CN116170131B (en) * 2023-04-20 2023-07-14 浪潮(北京)电子信息产业有限公司 Ciphertext processing method, ciphertext processing device, storage medium and trusted execution device
CN116527276A (en) * 2023-05-16 2023-08-01 合肥工业大学 Efficient privacy protection method for traffic monitoring service of Internet of vehicles
CN116527276B (en) * 2023-05-16 2024-03-19 合肥工业大学 Efficient privacy protection method for traffic monitoring service of Internet of vehicles
CN117118592B (en) * 2023-10-25 2024-01-09 北京航空航天大学 Method and system for selecting Internet of vehicles client based on homomorphic encryption algorithm
CN117118592A (en) * 2023-10-25 2023-11-24 北京航空航天大学 Method and system for selecting Internet of vehicles client based on homomorphic encryption algorithm
CN117201019B (en) * 2023-11-03 2024-01-30 北京航空航天大学 Vehicle message verification method, system and storage medium based on blockchain
CN117201019A (en) * 2023-11-03 2023-12-08 北京航空航天大学 Vehicle message verification method, system and storage medium based on blockchain
CN117827884A (en) * 2023-12-31 2024-04-05 北京海泰方圆科技股份有限公司 Batch data query method and device
CN118014742A (en) * 2024-04-08 2024-05-10 杭州大鱼网络科技有限公司 Insurance identity information transmission protection method and system
CN118158662A (en) * 2024-05-09 2024-06-07 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) Method for realizing position privacy protection in satellite vehicle networking

Also Published As

Publication number Publication date
CN112367305A (en) 2021-02-12
CN112367305B (en) 2022-05-20

Similar Documents

Publication Publication Date Title
WO2022082893A1 (en) Privacy blockchain-based internet of vehicles protection method, and mobile terminal
Zhang et al. An efficient blockchain-based hierarchical data sharing for Healthcare Internet of Things
Ma et al. Certificateless searchable public key encryption scheme for industrial internet of things
Zhang et al. CIPPPA: Conditional identity privacy-preserving public auditing for cloud-based WBANs against malicious auditors
Wu et al. Security analysis and enhancement of a certificateless searchable public key encryption scheme for IIoT environments
Miao et al. Fair and dynamic data sharing framework in cloud-assisted internet of everything
Omala et al. Provably secure heterogeneous access control scheme for wireless body area network
CN111863165B (en) Medical information sharing authentication method based on block chain
Hahn et al. Enabling fast public auditing and data dynamics in cloud services
Jiang et al. Anonymous and efficient authentication scheme for privacy-preserving distributed learning
Jung et al. Data management and searching system and method to provide increased security for IoT platform
Han et al. Verifiable and privacy preserving federated learning without fully trusted centers
Ji et al. Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property
Malina et al. Privacy-preserving security solution for cloud services
Malina et al. Efficient security solution for privacy-preserving cloud services
Das et al. MACPABE: Multi‐Authority‐based CP‐ABE with efficient attribute revocation for IoT‐enabled healthcare infrastructure
Deng et al. Policy-based broadcast access authorization for flexible data sharing in clouds
Gowda et al. BPCPR-FC: blockchain-based privacy preservation with confidentiality using proxy reencryption and ring signature in fog computing environments
Alamer et al. A privacy-preserving scheme to support the detection of multiple similar request-real-time services in IoT application systems
Han et al. TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage
Peng et al. A Secure Signcryption Scheme for Electronic Health Records Sharing in Blockchain.
Srivastava et al. Attack resistant blockchain-based healthcare record system using modified RSA Algorithm
EP4144042A1 (en) Adaptive attack resistant distributed symmetric encryption
Yu et al. Efficient anonymous data authentication for vehicular ad hoc networks
Hu et al. Improving security and privacy-preserving in multi-authorities ciphertext-policy attribute-based encryption

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20958471

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20958471

Country of ref document: EP

Kind code of ref document: A1