Journal of Zhejiang University-SCIENCE A

, Volume 7, Issue 6, pp 984–989 | Cite as

Protection of mobile location privacy by using blind signature

  • Liao Jian 
  • Qi Ying-hao 
  • Huang Pei-wei 
  • Rong Meng-tian 
  • Li Sheng-hong 
Article

Abstract

Location privacy means a user keeps his/her geographical location secret. If location information falls into the wrong hands, an adversary can physically locate a person. To address this privacy issue, Qi et al. (2004a; 2004b) proposed a special and feasible architecture, using blind signature to generate an authorized anonymous ID replacing the real ID of a legitimate mobile user. The original purpose of his architecture was to eliminate the relationship of authorized anonymous ID and real ID. We present an algorithm to break out Qi’s registration and re-confusion protocol, and then propose a new mechanism based on bilinear pairings to protect location privacy. Moreover we show that the administrator or third parity cannot obtain information on the legitimate user’s authorized anonymous ID and real ID in our proposed protocols.

Key words

Mobile computing Location privacy Security techniques and system Blind signature Location-based services 

CLC number

TN918 TP301 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M., 2001. The One-More-RSA-Inversion Problems and the Security of Chaum’s Blind Signature Scheme. Financial Cryptography’ 01. Springer LNCS, 2339:319–338.CrossRefMATHGoogle Scholar
  2. Beresford, A.R., Stajano, F., 2004. Mix Zones: User Privacy in Location-Aware Services. Proceedings of the Second IEEE Annual Conference, Pervasive Computing and Communications Workshops’04, p.127–131. [doi:10.1109/PERCOMW.2004.1276918]Google Scholar
  3. Boldyreva, A., 2003. Efficient Threshold Signature, Multisignature and Blind Signature Schemes Based on the Gap-Diffie-Hellman Group Signature Scheme. Public Key Cryptography-PKC’03. Springer LNCS, 2139:31–46.MathSciNetMATHGoogle Scholar
  4. Chaum, D., 1982. Blind Signatures for Untraceable Payments. Proceedings of Crypto’82.Google Scholar
  5. Einar, S., 2001. Concepts for Personal Location Privacy Policies. Proceedings of the ACM Conference on Electronic Commerce (EC’01), p.48–57.Google Scholar
  6. Fox, S., 2000. The Internet Life Report. Trust and Privacy Online: Why Americans Want to Rewrite the Rules. The Pew Internet & American Life Project, available at: http://www.pewinternet.org/reports/pdfs/PIP_Trust_Privacy_Report.pdf.
  7. Gedik, B., Ling, L., 2005. Location Privacy in Mobile Systems: A Personalized Anonymization Model. Proceedings of 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), p.620–629. [doi:10.1109/ICDCS.2005.48]Google Scholar
  8. Gruteser, M., Grunwald, D., 2003. Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking. Proceedings of ACM/USENIX International Conference on Mobile Systems, Applications, and Services.Google Scholar
  9. Gruteser, M., Schelle, G., Jain, A., Han, R., Grunwald, D., 2003. Privacy-Aware Location Sensor Networks. Proceedings of HotOS’03, 9th Workshop on Hot Topics in Operating Systems, USENIX, p.163–168.Google Scholar
  10. Hills, A., 1999. Wireless andrew. IEEE Spectrum, 36(6):49–53. [doi:10.1109/6.769269]CrossRefGoogle Scholar
  11. Qi, H., Wu, D., Khosla, P., 2004a. The quest for personal control over mobile location privacy. IEEE Communications Magazine, 42(5):130–136. [doi:10.1109/MCOM.2004.1299356]CrossRefGoogle Scholar
  12. Qi, H., Wu, D., Khosla, P., 2004b. A Mechanism for Personal Control over Mobile Location Privacy. Proceedings of IEEE/ACM First International Workshop on Broadband Wireless Services and Applications, BroadWISE 2004.Google Scholar
  13. Zhang, F., Safavi-Naini, R., Susilo, W., 2003. Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings. Progress in Cryptology-INDOCRYPT’03. Springer LNCS, 2904:191–204.MathSciNetMATHGoogle Scholar

Copyright information

© Zhejiang University 2006

Authors and Affiliations

  • Liao Jian 
    • 1
  • Qi Ying-hao 
    • 1
  • Huang Pei-wei 
    • 1
  • Rong Meng-tian 
    • 1
  • Li Sheng-hong 
    • 1
  1. 1.Department of Electronic EngineeringShanghai Jiao Tong UniversityShanghaiChina

Personalised recommendations