Please wait a minute...
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering)  2006, Vol. 7 Issue (6 ): 8-    DOI: 10.1631/jzus.2006.A0984
    
Protection of mobile location privacy by using blind signature
LIAO Jian, QI Ying-hao, HUANG Pei-wei, RONG Meng-tian, LI Sheng-hong
Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
Download:     PDF (0 KB)     
Export: BibTeX | EndNote (RIS)      

Abstract  Location privacy means a user keeps his/her geographical location secret. If location information falls into the wrong hands, an adversary can physically locate a person. To address this privacy issue, Qi et al.(2004a; 2004b) proposed a special and feasible architecture, using blind signature to generate an authorized anonymous ID replacing the real ID of a legitimate mobile user. The original purpose of his architecture was to eliminate the relationship of authorized anonymous ID and real ID. We present an algorithm to break out Qi’s registration and re-confusion protocol, and then propose a new mechanism based on bilinear pairings to protect location privacy. Moreover we show that the administrator or third parity cannot obtain information on the legitimate user’s authorized anonymous ID and real ID in our proposed protocols.

Key wordsMobile computing      Location privacy      Security techniques and system      Blind signature      Location-based services     
Received: 21 September 2005     
CLC:  TN918  
  TP301  
Cite this article:

LIAO Jian, QI Ying-hao, HUANG Pei-wei, RONG Meng-tian, LI Sheng-hong. Protection of mobile location privacy by using blind signature. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(6 ): 8-.

URL:

http://www.zjujournals.com/xueshu/zjus-a/10.1631/jzus.2006.A0984     OR     http://www.zjujournals.com/xueshu/zjus-a/Y2006/V7/I6 /8

[1] HUANG Zheng, CHEN Ke-fei, KOU Wei-dong. Untraceable partially blind signature based on DLOG problem[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2004, 5(1): 40-44.