Abstract
Location privacy means a user keeps his/her geographical location secret. If location information falls into the wrong hands, an adversary can physically locate a person. To address this privacy issue, Qi et al. (2004a; 2004b) proposed a special and feasible architecture, using blind signature to generate an authorized anonymous ID replacing the real ID of a legitimate mobile user. The original purpose of his architecture was to eliminate the relationship of authorized anonymous ID and real ID. We present an algorithm to break out Qi’s registration and re-confusion protocol, and then propose a new mechanism based on bilinear pairings to protect location privacy. Moreover we show that the administrator or third parity cannot obtain information on the legitimate user’s authorized anonymous ID and real ID in our proposed protocols.
Similar content being viewed by others
References
Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M., 2001. The One-More-RSA-Inversion Problems and the Security of Chaum’s Blind Signature Scheme. Financial Cryptography’ 01. Springer LNCS, 2339:319–338.
Beresford, A.R., Stajano, F., 2004. Mix Zones: User Privacy in Location-Aware Services. Proceedings of the Second IEEE Annual Conference, Pervasive Computing and Communications Workshops’04, p.127–131. [doi:10.1109/PERCOMW.2004.1276918]
Boldyreva, A., 2003. Efficient Threshold Signature, Multisignature and Blind Signature Schemes Based on the Gap-Diffie-Hellman Group Signature Scheme. Public Key Cryptography-PKC’03. Springer LNCS, 2139:31–46.
Chaum, D., 1982. Blind Signatures for Untraceable Payments. Proceedings of Crypto’82.
Einar, S., 2001. Concepts for Personal Location Privacy Policies. Proceedings of the ACM Conference on Electronic Commerce (EC’01), p.48–57.
Fox, S., 2000. The Internet Life Report. Trust and Privacy Online: Why Americans Want to Rewrite the Rules. The Pew Internet & American Life Project, available at: http://www.pewinternet.org/reports/pdfs/PIP_Trust_Privacy_Report.pdf.
Gedik, B., Ling, L., 2005. Location Privacy in Mobile Systems: A Personalized Anonymization Model. Proceedings of 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), p.620–629. [doi:10.1109/ICDCS.2005.48]
Gruteser, M., Grunwald, D., 2003. Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking. Proceedings of ACM/USENIX International Conference on Mobile Systems, Applications, and Services.
Gruteser, M., Schelle, G., Jain, A., Han, R., Grunwald, D., 2003. Privacy-Aware Location Sensor Networks. Proceedings of HotOS’03, 9th Workshop on Hot Topics in Operating Systems, USENIX, p.163–168.
Hills, A., 1999. Wireless andrew. IEEE Spectrum, 36(6):49–53. [doi:10.1109/6.769269]
Qi, H., Wu, D., Khosla, P., 2004a. The quest for personal control over mobile location privacy. IEEE Communications Magazine, 42(5):130–136. [doi:10.1109/MCOM.2004.1299356]
Qi, H., Wu, D., Khosla, P., 2004b. A Mechanism for Personal Control over Mobile Location Privacy. Proceedings of IEEE/ACM First International Workshop on Broadband Wireless Services and Applications, BroadWISE 2004.
Zhang, F., Safavi-Naini, R., Susilo, W., 2003. Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings. Progress in Cryptology-INDOCRYPT’03. Springer LNCS, 2904:191–204.
Author information
Authors and Affiliations
Additional information
Project (No. 60402019/F0102) supported by the National Natural Science Foundation of China
Rights and permissions
About this article
Cite this article
Liao, J., Qi, Yh., Huang, Pw. et al. Protection of mobile location privacy by using blind signature. J. Zhejiang Univ. - Sci. A 7, 984–989 (2006). https://doi.org/10.1631/jzus.2006.A0984
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1631/jzus.2006.A0984
Key words
- Mobile computing
- Location privacy
- Security techniques and system
- Blind signature
- Location-based services