scholarly journals The scheme of personal privacy protection based on data separation in Mobile identity authentication

2020 ◽  
Vol 1486 ◽  
pp. 052024
Author(s):  
Fang Zheng ◽  
Pingzhen Li ◽  
Jianqin Wei
2020 ◽  
Author(s):  
Jing Fan

UNSTRUCTURED Smartphone-based contact tracing is proven to be effective in epidemic containment. To maintain its utilization meanwhile ensure the protection of personal privacy, different countries came up with different practices, new exploratory solutions may come into real-world practice soon as well.


Entropy ◽  
2021 ◽  
Vol 23 (12) ◽  
pp. 1657
Author(s):  
Ke Yuan ◽  
Yingjie Yan ◽  
Tong Xiao ◽  
Wenchao Zhang ◽  
Sufang Zhou ◽  
...  

In response to the rapid growth of credit-investigation data, data redundancy among credit-investigation agencies, privacy leakages of credit-investigation data subjects, and data security risks have been reported. This study proposes a privacy-protection scheme for a credit-investigation system based on blockchain technology, which realizes the secure sharing of credit-investigation data among multiple entities such as credit-investigation users, credit-investigation agencies, and cloud service providers. This scheme is based on blockchain technology to solve the problem of islanding of credit-investigation data and is based on zero-knowledge-proof technology, which works by submitting a proof to the smart contract to achieve anonymous identity authentication, ensuring that the identity privacy of credit-investigation users is not disclosed; this scheme is also based on searchable-symmetric-encryption technology to realize the retrieval of the ciphertext of the credit-investigation data. A security analysis showed that this scheme guarantees the confidentiality, the availability, the tamper-proofability, and the ciphertext searchability of credit-investigation data, as well as the fairness and anonymity of identity authentication in the credit-investigation data query. An efficiency analysis showed that, compared with similar identity-authentication schemes, the proof key of this scheme is smaller, and the verification time is shorter. Compared with similar ciphertext-retrieval schemes, the time for this scheme to generate indexes and trapdoors and return search results is significantly shorter.


IEEE Access ◽  
2017 ◽  
pp. 1-1 ◽  
Author(s):  
Shuangxi Hong ◽  
Chuanchang Liu ◽  
Bingfei Ren ◽  
Yuze Huang ◽  
Junliang Chen

2017 ◽  
Vol 15 (3) ◽  
pp. 328-335 ◽  
Author(s):  
Robin Wilton

Purpose This paper aims to provide a non-academic perspective on the research reports of the JICES “Post-Snowden” special edition, from the viewpoint of a privacy advocate with an IT background. Design/methodology/approach This paper was written after reviewing the country reports for Japan, New Zealand, PRC and Taiwan, Spain and Sweden, as well as the Introduction paper. The author has also drawn on online sources such as news articles to substantiate his analysis of attitudes to technical privacy protection post-Snowden. Findings Post-Snowden, the general perception of threats to online privacy has shifted from a predominant focus on commercial threats to a recognition that government activities, in the sphere of intelligence and national security, also give rise to significant privacy risk. Snowden’s disclosures have challenged many of our assumptions about effective oversight of interception capabilities. Citizens’ expectations in this regard depend partly on national experience of the relationship between citizen and government, and can evolve rapidly. The tension between legitimate law enforcement access and personal privacy remains challenging to resolve. Originality/value As a “viewpoint” paper, this submission draws heavily on the author’s experience as a privacy and technology subject-matter expert. Although it therefore contains a higher proportion of opinion than the academic papers in this issue, his hope is that it will stimulate debate and further research.


Sign in / Sign up

Export Citation Format

Share Document