Skip to main content
Log in

Protection of mobile location privacy by using blind signature

  • Published:
Journal of Zhejiang University-SCIENCE A Aims and scope Submit manuscript

Abstract

Location privacy means a user keeps his/her geographical location secret. If location information falls into the wrong hands, an adversary can physically locate a person. To address this privacy issue, Qi et al. (2004a; 2004b) proposed a special and feasible architecture, using blind signature to generate an authorized anonymous ID replacing the real ID of a legitimate mobile user. The original purpose of his architecture was to eliminate the relationship of authorized anonymous ID and real ID. We present an algorithm to break out Qi’s registration and re-confusion protocol, and then propose a new mechanism based on bilinear pairings to protect location privacy. Moreover we show that the administrator or third parity cannot obtain information on the legitimate user’s authorized anonymous ID and real ID in our proposed protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M., 2001. The One-More-RSA-Inversion Problems and the Security of Chaum’s Blind Signature Scheme. Financial Cryptography’ 01. Springer LNCS, 2339:319–338.

    Article  MATH  Google Scholar 

  • Beresford, A.R., Stajano, F., 2004. Mix Zones: User Privacy in Location-Aware Services. Proceedings of the Second IEEE Annual Conference, Pervasive Computing and Communications Workshops’04, p.127–131. [doi:10.1109/PERCOMW.2004.1276918]

  • Boldyreva, A., 2003. Efficient Threshold Signature, Multisignature and Blind Signature Schemes Based on the Gap-Diffie-Hellman Group Signature Scheme. Public Key Cryptography-PKC’03. Springer LNCS, 2139:31–46.

    MathSciNet  MATH  Google Scholar 

  • Chaum, D., 1982. Blind Signatures for Untraceable Payments. Proceedings of Crypto’82.

  • Einar, S., 2001. Concepts for Personal Location Privacy Policies. Proceedings of the ACM Conference on Electronic Commerce (EC’01), p.48–57.

  • Fox, S., 2000. The Internet Life Report. Trust and Privacy Online: Why Americans Want to Rewrite the Rules. The Pew Internet & American Life Project, available at: http://www.pewinternet.org/reports/pdfs/PIP_Trust_Privacy_Report.pdf.

  • Gedik, B., Ling, L., 2005. Location Privacy in Mobile Systems: A Personalized Anonymization Model. Proceedings of 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), p.620–629. [doi:10.1109/ICDCS.2005.48]

  • Gruteser, M., Grunwald, D., 2003. Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking. Proceedings of ACM/USENIX International Conference on Mobile Systems, Applications, and Services.

  • Gruteser, M., Schelle, G., Jain, A., Han, R., Grunwald, D., 2003. Privacy-Aware Location Sensor Networks. Proceedings of HotOS’03, 9th Workshop on Hot Topics in Operating Systems, USENIX, p.163–168.

  • Hills, A., 1999. Wireless andrew. IEEE Spectrum, 36(6):49–53. [doi:10.1109/6.769269]

    Article  Google Scholar 

  • Qi, H., Wu, D., Khosla, P., 2004a. The quest for personal control over mobile location privacy. IEEE Communications Magazine, 42(5):130–136. [doi:10.1109/MCOM.2004.1299356]

    Article  Google Scholar 

  • Qi, H., Wu, D., Khosla, P., 2004b. A Mechanism for Personal Control over Mobile Location Privacy. Proceedings of IEEE/ACM First International Workshop on Broadband Wireless Services and Applications, BroadWISE 2004.

  • Zhang, F., Safavi-Naini, R., Susilo, W., 2003. Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings. Progress in Cryptology-INDOCRYPT’03. Springer LNCS, 2904:191–204.

    MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

Project (No. 60402019/F0102) supported by the National Natural Science Foundation of China

Rights and permissions

Reprints and permissions

About this article

Cite this article

Liao, J., Qi, Yh., Huang, Pw. et al. Protection of mobile location privacy by using blind signature. J. Zhejiang Univ. - Sci. A 7, 984–989 (2006). https://doi.org/10.1631/jzus.2006.A0984

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1631/jzus.2006.A0984

Key words

CLC number

Navigation