Research on Privacy Protection Technology in Face Identity Authentication System Based on Edge Computing

Author(s):  
Yunli Cheng ◽  
Hainie Meng ◽  
Yaohua Lei ◽  
Xueqin Tan
Author(s):  
Hasnain Ali Almashhadani ◽  
Xiaoheng Deng ◽  
Suhaib Najeh Abdul Latif ◽  
Mohammed Mohsin Ibrahim ◽  
Ali Hussien Alshammari

2021 ◽  
Vol 1804 (1) ◽  
pp. 012144
Author(s):  
Hesham Hashim Mohammed ◽  
Shatha A. Baker ◽  
Ahmed S. Nori

Entropy ◽  
2021 ◽  
Vol 23 (12) ◽  
pp. 1657
Author(s):  
Ke Yuan ◽  
Yingjie Yan ◽  
Tong Xiao ◽  
Wenchao Zhang ◽  
Sufang Zhou ◽  
...  

In response to the rapid growth of credit-investigation data, data redundancy among credit-investigation agencies, privacy leakages of credit-investigation data subjects, and data security risks have been reported. This study proposes a privacy-protection scheme for a credit-investigation system based on blockchain technology, which realizes the secure sharing of credit-investigation data among multiple entities such as credit-investigation users, credit-investigation agencies, and cloud service providers. This scheme is based on blockchain technology to solve the problem of islanding of credit-investigation data and is based on zero-knowledge-proof technology, which works by submitting a proof to the smart contract to achieve anonymous identity authentication, ensuring that the identity privacy of credit-investigation users is not disclosed; this scheme is also based on searchable-symmetric-encryption technology to realize the retrieval of the ciphertext of the credit-investigation data. A security analysis showed that this scheme guarantees the confidentiality, the availability, the tamper-proofability, and the ciphertext searchability of credit-investigation data, as well as the fairness and anonymity of identity authentication in the credit-investigation data query. An efficiency analysis showed that, compared with similar identity-authentication schemes, the proof key of this scheme is smaller, and the verification time is shorter. Compared with similar ciphertext-retrieval schemes, the time for this scheme to generate indexes and trapdoors and return search results is significantly shorter.


Sign in / Sign up

Export Citation Format

Share Document