[1]陈梁景,王志伟.隐私保护的传染病密切接触者身份追踪系统[J].计算机技术与发展,2022,32(09):167-173.[doi:10. 3969 / j. issn. 1673-629X. 2022. 09. 026]
 CHEN Liang-jing,WANG Zhi-wei.A Privacy-protected Identity Tracking System for Close Contacts of Infectious Diseases[J].,2022,32(09):167-173.[doi:10. 3969 / j. issn. 1673-629X. 2022. 09. 026]
点击复制

隐私保护的传染病密切接触者身份追踪系统()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
32
期数:
2022年09期
页码:
167-173
栏目:
新型计算应用系统
出版日期:
2022-09-10

文章信息/Info

Title:
A Privacy-protected Identity Tracking System for Close Contacts of Infectious Diseases
文章编号:
1673-629X(2022)09-0167-07
作者:
陈梁景1 王志伟123
1. 南京邮电大学 计算机学院,江苏 南京 210003
2. 江苏省大数据安全与智能处理重点实验室,江苏 南京 210023
3. 江苏省计算机网络技术重点实验室,江苏 南京 210096
Author(s):
CHEN Liang-jing1 WANG Zhi-wei123
1. School of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing 210003,China
2. Jiangsu Key Laboratory of Big Data Security and Intelligent Processing,Nanjing 210023,China
3. Jiangsu Key Laboratory of Computer Networking Technology,Nanjing 210096,China
关键词:
身份认证群签名匿名隐私保护零知识证明
Keywords:
identity authenticationgroup signatureanonymousprivacy protectionzero-knowledge proof
分类号:
TP309
DOI:
10. 3969 / j. issn. 1673-629X. 2022. 09. 026
摘要:
近年来,传染性疾病比如肺炎的大规模爆发给人们敲响警钟。 关于传染病患者及其密切接触者的发现以及隔离对于控制疫情异常重要。 传统的密切接触者身份追踪依靠被感染者的记忆来回忆他 / 她接触过的人的名单,并向医院工作人员报告。 这种方法不准确、效率低,也不是一种快速抑制病毒传播的方法。 针对传染病密切接触者的身份追踪及其隐私保护问题,该文设计了一个传染病密切接触者身份追踪系统,可以保证患者及密切接触者的隐私不被泄露。 系统中的身份认证协议,利用零知识证明,证明相遇认证双方公钥的正确产生,节约了公钥证书验证的开销。 系统中改进了带属性的群签名,认证患者确诊的事实的同时,隐藏患者的身份,保护了患者及密切接触者的隐私。 系统能将患者的密切接触者信息及时锁定并秘密通知本人,来达到疫情控制的目的。 从安全性分析和性能分析来看,该系统具有较好的灵活性、安全性、计算效率。
Abstract:
In recent years,large-scale outbreaks of infectious diseases such as pneumonia have sounded alarm bells. The detection and isolation of? patients with infectious diseases and their close contacts is extremely important to control the outbreak. Traditional contactidentity tracing? ? ? ?relies on an infected person’s memory to recall a list of people he / she has been in contact with and report it to hospital staff. This method is inaccurate,inefficient,and not a quick way to suppress the spread of the virus. Aiming at the identity tracking and privacy protection of close contacts of infectious diseases,we design an identity tracking system for close contacts of infectious diseases,which can ensure that the privacy? of patients and close contacts is not leaked. The identity authentication protocol in the system uses zero-knowledge proof to prove the correct generation of the public keys of the two parties that meet and authenticate,saving the cost of public key certificate verification. The group signature with attributes has been improved in the system,which verifies the fact that the patient is diagnosed,and at the same time hides the patient’s identity and protects the privacy of the patient and close contacts. The system can lock the patient’s close contact information in a timely manner and secretly notify the patient to achieve the purpose of epidemic control. From the security analysis and performance an alysis,the system has better flexibility,security and computational efficiency.

相似文献/References:

[1]田志英 廖晓群 赵安新.校园网认证计费系统的研究与实现[J].计算机技术与发展,2010,(05):202.
 TIAN Zhi-ying,LIAO Xiao-qun,ZHAO An-xin.Research and Implementation of Campus Network Authentication and Accounting System[J].,2010,(09):202.
[2]万久士 李翔 林祥.基于JSSh实现身份认证网站信息采集[J].计算机技术与发展,2009,(10):156.
 WAN Jiu-shi,LI Xiang,LIN Xiang.Information Collection of Website which Achieve Identity Authentication Based on JSSh[J].,2009,(09):156.
[3]王大星 滕济凯.一种基于群签名的有效电子现金模型[J].计算机技术与发展,2009,(10):174.
 WANG Da-xing,TENG Ji-kai.An Efficient Electronic Cash Model Based on Group Signature[J].,2009,(09):174.
[4]贺锋 王汝传.一种基于PKI的P2P身份认证技术[J].计算机技术与发展,2009,(10):181.
 HE Feng,WANG Ru-chuan.A Peer- to- Peer Identity Authentication Technology Based on PKI[J].,2009,(09):181.
[5]吕武玲 黎忠文.SIP中基于身份认证的安全机制研究[J].计算机技术与发展,2009,(02):158.
 LU Wu-ling,LI Zhong-wen.Research on Identity- Based Authentication in SIP[J].,2009,(09):158.
[6]徐明 张祥德.一个基于群签名的电子钱包的应用方案[J].计算机技术与发展,2008,(04):134.
 XU Ming,ZHANG Xiang-de.Application of Electronic Wallet Based on Group Signature[J].,2008,(09):134.
[7]孙印杰 陈智芳 王敏 洪力.基于指纹和数字水印的网络身份认证系统研究[J].计算机技术与发展,2008,(04):147.
 SUN Yin-jie,CHEN Zhi-fang,WANG Min,et al.Research of Authentication System Based on Fingerprint and Digital Watermarking[J].,2008,(09):147.
[8]黄叶珏 陈勤.Web网站统一口令认证系统的设计与实现[J].计算机技术与发展,2007,(06):163.
 HUANG Ye-jue,CHEN Qin.Design and Implementation of Web Site Universal Password Authentication System[J].,2007,(09):163.
[9]汪精明 王平水.两个群签名方案的安全性分析[J].计算机技术与发展,2007,(09):149.
 WANG Jing-ming,WANG Ping-shui.Security Analysis of Two Group Signature Schemes[J].,2007,(09):149.
[10]张骏 张耀鸿 陈力群.类群签名技术在财务管理系统上的运用研究[J].计算机技术与发展,2007,(01):177.
 ZHANG Jun,ZHANG Yao-hong,CHEN Li-qun.Application Research of Finance MIS with a Similar Group Signature[J].,2007,(09):177.

更新日期/Last Update: 2022-09-10