A method and system for anonymous authentication of trust in decentralized mobile crowdsourcing

An anonymous authentication and decentralized technology, applied in the field of data processing, can solve the problems of anonymous trust authentication in mobile crowdsourcing systems, lack of data privacy protection related to node trust, and inability to prevent attackers from tracking node behavior, etc., to achieve high efficiency and protect trust Evaluate, protect node identity privacy, and ensure the effect of trusted execution

Active Publication Date: 2021-10-22
XIDIAN UNIV
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Through the above analysis, the existing problems and defects of the existing technology are as follows: (1) The trust evaluation method based on the blockchain smart contract has high cost and poor efficiency, and lacks privacy protection for node trust-related data
[0009] (2) The decentralized authentication method based on zero-knowledge proof takes a long time to generate proof and is inefficient
[0010] (3) A decentralized authentication method based on blockchain-based public key infrastructure (Public Key Infrastructure, PKI), which cannot prevent attackers from tracking node behavior due to the open and transparent nature of blockchain
There is a contradiction between the credibility and efficiency of decentralized trust evaluation; there are difficulties in the anonymous trust authentication of the blockchain-based mobile crowdsourcing system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for anonymous authentication of trust in decentralized mobile crowdsourcing
  • A method and system for anonymous authentication of trust in decentralized mobile crowdsourcing
  • A method and system for anonymous authentication of trust in decentralized mobile crowdsourcing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0104] figure 2 It is a node (including mobile devices, personal computers, and servers), including mobile devices, personal computers, and servers, including mobile devices, personal computers, and servers, including mobile devices, personal computers, and servers. Connected together, mainly including five types of nodes, namely MCS users, operating nodes, miners, data storage nodes, and cloud servers configured to configure SGX. The user is a node that cannot complete the data collection task, so the mission is assigned to a set of mobile users (ie, the working node) using the MCS system to perform the task; the working node is the mobile device to complete the task as the data collection sensor. Users; miners jointly maintain the block chain system. In order to facilitate expression, the present invention uses BC = {B 0 , B 1 , ..., B k } Represents the block chain, where B i (0 ≤ i ≤ k) represents the i-th block of the block chain. The present invention uses the block chain t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of data processing, and discloses an anonymous authentication method and system for trust in decentralized mobile crowdsourcing. Nodes registered in the blockchain system generate a new public-private key pair, and the generated key change request is sent to the cloud The trusted execution environment of the server, the cloud server processes the node key change signal, secretly links the trust evaluation result, and publishes the key change result on the blockchain system; the signature verification node signs the message with the changed private key and passes The blockchain system conducts trust authentication on the signature node. The present invention selects all public key signature mechanisms such as RSA according to needs, and includes behavior-based trust evaluation schemes, which are not limited to using Bloom filters. Included feedback-based trust evaluation scheme, weight calculation can be based on methods based on game theory, machine learning and trust theory.

Description

Technical field [0001] The present invention belongs to the field of data processing, and in particular, the present invention relates to an anonymous authentication method and system for trust based on the block chain. Background technique [0002] Mobile CrowdSourcing, MCS is a new data acquisition system that collects data with mobile devices. Traditional MCS is based on centralized architecture, facing a single point of failure, and security, privacy, and trust problems caused by untrusted center entities. Therefore, it is necessary to design the desired MCS system. [0003] However, the decentralized MCS system lacks the credibility center assessment and guaranteeing node trust, and thus requires detrimental trust assessment and supporting certification of node trust. Considering the need for nodes to identify privacy and data privacy, you need to implement anonymous authentication for trust, namely anonymous trust authentication. [0004] In MCS, trust information helps to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32G06N3/04G06F21/64
CPCH04L63/0421H04L63/08H04L63/0428H04L63/0435H04L67/1097H04L9/3247G06F21/64G06F2201/83H04L9/50G06N3/044
Inventor 闫峥冯伟
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products