This application is based upon and claims priority to Chinese Patent Application No. 202310547496.3, filed on May 16, 2023, the entire contents of which are incorporated herein by reference.
The present disclosure relates to the technical field of privacy protection, and in particular, to a method and system for protecting location privacy in mobile payment, a medium, a device, and a terminal.
At present, with the continuous popularization of intelligent terminal devices and the development and innovation of mobile payment technology, application scenarios for mobile payment gradually tend to be diversified and vertical, covering all aspects of people's daily lives, and mobile payment has become a mainstream payment method in society.
However, privacy and security issues with mobile payment are constantly emerging, while the mobile payment industry is generally booming. In a real scenario, when a user uses mobile payment for account settlement in a store, because the geographical location of the store is relatively fixed, a payment platform can easily determine a physical relation between the user and the consumption location thereof based on user transaction information grasped by the payment platform and store location information provided by a merchant. Assuming that users A and B, respectively, use mobile payment for settlement in a bar and a pharmacy, a mobile payment platform has transaction information about the users and can associate the users with corresponding consumption locations in combination with the geographical locations of the bar and the pharmacy. If the mobile payment platform illegally abuses the consumption location information of the users, it can obtain other personal privacy information about the users, such as their consumption level, interests and hobbies, health status and others. Although a friend-entrusted payment function provided by the mobile payment platform can disturb correspondence between the user and the consumption location thereof to some extent, the privacy of the transaction information results in a low rate of using this function. Therefore, people are facing leakage risks of personal privacy information while enjoying the convenience of mobile payments.
At present, research on mobile payment security by researchers around the world focuses more on payment security. Research on location privacy and security is quite scarce. Most of the location privacy protection mechanisms proposed by existing research are also oriented toward location-based service (LBS) scenarios, and are not suitable for mobile payment environments. Therefore, a location privacy leakage problem in mobile payments still needs to be resolved.
To resolve the location privacy leakage problem in mobile payments, a transaction association between a user and a merchant needs to be cut off. An anonymous transaction is the best idea to remove the transaction association. Disclosure of the pseudo-anonymity of bitcoins has led to the prevalence of anonymous transactions in the bitcoin field. A decentralized coin mixing scheme is widely used due to the lack of need for third-party mixing servers and complex cryptographic techniques. An anonymous transaction can remove the relation between a user and a merchant location from a transaction record and disturb the mapping relationship between the user and the consumption location thereof. In this way, even if the mobile payment platform has the transaction record of the user and location information of the store, it cannot determine who is consuming at the current location to protect the location information security of the user. However, even if the possible bad behavior of collaborative users in a transaction process is considered and a corresponding accountability mechanism is designed in the existing decentralized coin mixing scheme, because the reputations of the collaborative users are not evaluated when an anonymous set is constructed, the final generated anonymous set still includes low-reputation collaborative users. This increases the risk of malicious leakage of user transaction information and reduces the anonymity of the scheme.
Academic research has found that the public auditing property of a blockchain poses a serious threat to the identity privacy of bitcoin users and is committed to finding a solution to enhance anonymity of bitcoin transactions. Existing research may be broadly classified into two types: anonymous cryptocurrencies and coin mixing schemes.
Miers et al. believed that existing e-cash schemes rely on a trusted currency issuer to create e-cash, which is inconsistent with a distributed system architecture of bitcoins, and that there is a single point of failure problem with the participation of a trusted third party. In view of this, they proposed a distributed e-cash system called Zerocoin without the participation of a trusted third party. A zero-knowledge proof technology is used to destroy the relation between individual bitcoin transactions and expand the coin-mixing scope. However, the maintenance costs for the system are very high due to the use of complex cryptography technology. Danezis et al. used an elliptic curve signature and a bilinear mapping to replace a strong Rivest-Shamir-Adleman (RSA) assumption and a double discrete logarithm proof on which Zerocoin relies to improve overall performance of the scheme. Garman et al. argued that Zerocoin achieves strong anonymity of transactions but has high system overheads. They proposed reducing the quantity of non-interactive zero-knowledge proofs by increasing coin forgery costs, to reduce computational overheads of the system. Even if the performance of Zerocoin is improved in the prior art, Zerocoin itself is not a completely anonymous currency but still shows a target address and a specific amount of a transaction. Therefore, Sasson et al. developed an anonymous payment scheme called Zerocash with a stronger privacy protection function through a concise and non-interactive zero-knowledge proof. On the basis of Zerocoin, Zerocash protects the transaction amount and identity privacy of both parties and implements full anonymity for transactions. However, a trusted third party is needed to generate global parameters, and the overall efficiency of the scheme is low due to an unfalsifiable cryptographic assumption relied on.
The basic principle of a coin-mixing idea was first proposed by Chuam. Asymmetrically encrypted communication information is transmitted through an intermediary to prevent an attacker from identifying the identities of and a relation between both communication parties. Existing coin mixing schemes are classified into centralized coin mixing schemes and decentralized coin mixing schemes based on whether the schemes rely on third-party mixing servers.
In a centralized MixCoin scheme proposed by Bonneau et al., a mixing server, Mix, processes all transactions to remove a relation between both transaction parties. An accountability mechanism is designed to prevent Mix from stealing users' bitcoins. However, a mapping between an input address and an output address of a transaction is visible to Mix, such that Mix can leak users' transaction information. Therefore, Yu and Valenta used blind signature technology to prevent Mix from linking the input address to the output address and protect users' transaction information from being maliciously leaked by Mix. Heilmanet et al. designed a centralized TumbleBit scheme on the premise that a third party is untrusted. The scheme uses blind signatures and smart contracts to ensure the security of transactions between users and Mix and uses a cut-and-choose method of secure multiparty computation to remove links between users and Mix and enhance transaction anonymity. In view of the problem that an existing blind signature scheme is incompatible with an elliptic curve digital signature algorithm (ECDSA) used in a bitcoin protocol, Yi et al. proposed a blind signature compatible with a standard ECDSA and applied the proposed blind ECDSA to implement the anonymity of bitcoin transactions. Liu et al. designed an unlinkable coin mixing scheme through a group transaction and a ring signature technology such that untrusted Mix can only check whether the output address belongs to its customer but does not determine which address belongs to which customer, to prevent Mix from leaking users' privacy. However, exposure to Mix increases the possibility of guessing both parties of an actual transaction. In addition, there is vulnerability to denial-of-service (DOS) attacks due to a performance bottleneck in Mix. To resolve the Mix performance bottleneck problem of the centralized coin mixing scheme, Lu et al. constructed a system model based on user-mix-supervisor and designed a random selection algorithm for Mix to enhance anonymity and the anti-DOS attack ability of the scheme. In this model, Mix is responsible only for hosting and transferring bitcoins, and the supervisor is responsible only for allocating and managing coin mixing tasks, to eliminate risks of becoming a performance bottleneck. However, in this scheme, the supervisor can still determine the Mix selected by the user and a specific transaction address, such that the supervisor can leak the user's private information and break transaction anonymity.
The centralized coin mixing scheme relies on a third-party mixing server, resulting in problems of a single point of failure and a performance bottleneck. In view of these problems, Maxwell et al. proposed a decentralized coin mixing scheme called Coinjoin without the participation of any trusted or untrusted third-party mixing server. Nodes in a blockchain serve as intermediaries to replace the mixing server. However, in the negotiation process between the nodes, the intermediaries may infer relevant transaction information and collude with each other. In addition, and are vulnerable to DOS attacks. Ruffing et al. improved Coinjoin and proposed a transaction shuffling scheme called CoinShuffle. Although the possibility that the nodes have malicious behavior is avoided, there is vulnerability to DOS attacks. When a quantity of tasks is very large, this scheme can select only one task to perform coin mixing and has poor performance. Bissias et al. proposed the Xim scheme, which allows users to randomly and anonymously select intermediaries. This scheme increases difficulty in guessing a mapping relationship between both transaction parties and can resist DOS attacks. However, it takes several hours to complete a bitcoin mixing task, resulting in that the scheme has low execution efficiency. Ziegeldorf et al. used a threshold signature technology and a threshold ECDSA signature scheme to generate escrow addresses in a distributed manner. User funds transferred to the escrow address are jointly owned and controlled by a plurality of mixing nodes. The funds in the escrow address can be redeemed through a threshold transaction only when most nodes agree. Therefore, a coin mixing scheme called CoinParty is constructed, which allows a part of nodes to fail or even launch malicious attacks. However, due to a limitation on the maximum transaction size of bitcoins, only a small quantity of transactions can be processed at a time, intermediaries need to always be online, and there is vulnerability to DOS attacks. Zijue WANG et al. combined a one-way aggregate signature technology, homomorphic encryption, and the coin mixing idea to implement anonymous protection of information such as a user identity and a transaction amount. Mardi et al. proposed a multiparty shuffling scheme to resolve a problem of high system overheads caused by the need for a plurality of signatures from participants in the existing decentralized coin mixing scheme. Through a plurality of rounds of shuffling, an attacker cannot determine the relation between both transaction parties, such that anonymization of bitcoin transactions is implemented. However, there are the same limitations as CoinShuffle, and the execution efficiency of the scheme is low.
In conclusion, anonymous cryptocurrency relies on complex cryptography technology, making the overall efficiency of the scheme low. The centralized coin mixing scheme, with the introduction of a third-party mixing server, has the problems of a single point of failure and a performance bottleneck. In contrast, the decentralized coin mixing scheme has the advantages of simple deployment and good performance. However, although a corresponding accountability mechanism is designed in the existing decentralized coin mixing scheme to restrict the behavior of nodes, credibility of the nodes is not measured when an anonymous set is constructed. If a node with low credibility is introduced to participate in coin mixing, the risks of the node maliciously leaking user information increase, thereby reducing the anonymity of the scheme. Therefore, directly applying the existing anonymous bitcoin transaction schemes cannot effectively implement the anonymous transactions of mobile payment users.
Through the foregoing analysis, the prior art has the following problems and defects:
In view of the problems in the prior art, the present disclosure provides a method and system for protecting location privacy in mobile payment, a medium, a device, and a terminal, and in particular, relates to a method and system for protecting location privacy in mobile payment based on reputation evaluation and a double auction, a medium, a device, and a terminal.
The present disclosure is implemented as follows. A method for protecting location privacy in mobile payment includes: introducing a decentralized coin mixing idea into mobile payment, and constructing an anonymous transaction model and a reputation evaluation model in a mobile payment environment; designing a user reputation evaluation scheme, and measuring a reputation value of a user based on historical behavior of the user; designing an anonymous transaction scheme based on reputation evaluation and a double auction, and establishing a functional relationship between the reputation value of the user and an auction bid; selecting, through the double auction, candidate collaborative users who meet a reputation requirement, a privacy requirement and a bid standard of a requesting user, to construct an anonymous set; and inserting the anonymous set constructed by collaborative users between the user and a merchant to cut off a direct transaction association between the user and the merchant and implement transaction anonymization.
Further, the anonymous transaction model in the mobile payment environment constructed based on the decentralized coin mixing idea includes the requesting user, the collaborative users and the merchant. A secure communication link exists between the requesting user and the collaborative user.
A set of all users in a network is U={P0, P1, P2, . . . , Pn, . . . , Pm}. The requesting user P0 is an initiator of an anonymous transaction, sends an anonymous transaction collaboration request QP
Impact of the historical behavior of the user in an anonymous transaction process on the reputation value of the user is analyzed through the reputation evaluation model. Within a discrete time period T={1, 2, . . . , t, . . . }, the requesting user P0 broadcasts the collaboration request QP
If the network user Pj has behavior of falsifying information during response to the requesting user P0, a reputation value of the network user is reduced as a penalty. A formula for measuring an instantaneous reputation value XP
If the collaborative user Ai leaks the specific collaboration task di(Ai→Ai+1) issued by the requesting user P0, or delays or interrupts execution of the collaboration task, a reputation value of the collaborative user is reduced as a penalty. If the collaborative user honestly executes the collaboration task, the reputation value of the collaborative user is increased as a reward. A formula for measuring an instantaneous reputation value XA
p is an incentive factor. n is a penalty factor. αPt is a cumulative quantity of times the user honestly participates in anonymous transactions by t. BPt is a cumulative quantity of times the user has bad behavior by t. 0<p«n<1, and a self-interested user is prompted to adhere to rational consensus by increasing a penalty. The instantaneous reputation value of the user meets a condition 0≤XP(t)≤1. An initial reputation value XP(0) of the user is 0.5.
Each instantaneous reputation value XP(t) of the user in the anonymous transaction process is fused to calculate a comprehensive reputation value of the user. A quadratic decreasing function is used to define a weight of each instantaneous reputation value XP(t) of the user in the comprehensive reputation value as follows:
where T is a current moment, and Γ is a validity period of the reputation value. When t=T, ω(XP(t))=1. That is, when XP(t) is a reputation value at the current moment, a weight of the reputation value in the comprehensive reputation value is 1. When 0≤t≤T−Γ, ω(XPt))=0, indicating that a reputation value at a moment with an interval to the current moment T exceeding the validity period Γ is not used for evaluation. The comprehensive reputation value of the user is finally obtained through a weighted average sum method as follows:
A double auction mechanism includes: In the network, n requesting users U={P0,P1,P2, . . . , Pn} are waiting for anonymous services and m network users U′={Pn+1, Pn+2, . . . , Pn+m} are waiting to receive collaboration tasks. Each requesting user Pi∈U broadcasts a collaboration request QP
The bid base of the requesting user is
φ(Δt) is a decreasing function. A bid OP
Further, the method for protecting location privacy in mobile payment includes the following steps:
Further, the anonymous set generation phase in step 1 includes:
(1) before executing a mobile payment transaction, broadcasting, by the requesting user P0, a collaboration request QP
(2) after receiving the collaboration request QP
1) if VerP
if
indicating that the identity and the comprehensive reputation value of the requesting user both pass the verification, determining, by the network user based on a bid base OP
if
indicating that the comprehensive reputation value of the requesting user fails the verification, broadcasting, by the network user Pj, information messageP
2) if VerP
(3) verifying, by the requesting user P0, correctness of the reply RP
1) if VerP
if
indicating that the comprehensive reputation value of the network user passes the verification, taking the network user Pj as a candidate collaborative user; or
if
indicating that the comprehensive reputation value of the network user fails the verification, broadcasting, by the requesting user P0, information messageP
2) if VerP
(4) ranking, by the requesting user P0, the candidate collaborative user in ascending order of the comprehensive reputation value XP
In the anonymous set generation phase, after the network user Pj receives the collaboration request OP
Further, the transaction execution phase in step 2 includes:
(1) executing, by the requesting user P0, a fund transfer transaction d0(P0A1), and sending a transaction credential
to the collaborative user A1, where
represents a transaction number obtained after the requesting user P0 executes d0(P0A1); and sending a collaboration task
to the collaborative user Ai, where add(Ai+1) represents a target address of a transaction to be executed by the collaborative user Ai;
(2) after receiving the transaction credential
sent by the requesting user P0, verifying, by the collaborative user A1, authenticity of the transaction credential:
1) if
verifying the signature information
and
if
indicating that an identity of and the transaction number transmitted by the requesting user P0 are both true, broadcasting no information; or if
indicating that an identity of the requesting user P0 is forged, broadcasting information messageA
2) if
indicating that the transaction number transmitted by the requesting user P0 is not true or valid, broadcasting, by the collaborative user A1, information
without verifying the signature information
and
immediately terminating, by the remaining collaborative users who receive the broadcast information messageA
(3) after receiving the collaboration task
send by the requesting user P0, checking, by the collaborative user Ai, whether the information messageA
1) if VerP
and after executing the transaction di(AiAi+1), sending a collaboration credential
to the requesting user P0 to obtain remuneration for executing the anonymous transaction; or
2) if VerP
execution of an actual transaction D(P0→S) of the requesting user is completed only after all collaborative users Ai in the anonymous set execute the transaction di, that is, ∀Ai∈Set, Ai has executed di(AiAi+1)⇔D(P0→S) is completed;
(4) after receiving the collaboration credential
sent by the collaborative user Ai, verifying, by the requesting user P0, the collaboration credential:
1) if
verifying the signature information
and
if
indicating that a transaction number transmitted by the collaborative user Ai is true and valid and an identity of the collaborative user passes the verification, executing, by the requesting user, a remuneration transaction
and sending a payment credential
to the collaborative user Ai; or
if
indicating that an identity of the collaborative user Ai is forged, broadcasting information messageP
2) if
indicating that a transaction number transmitted by the collaborative user Ai is not true or valid, broadcasting, by the requesting user P0, information
without verifying the signature information
and
if the anonymous transaction is successfully completed but the collaborative user Ai does not finish executing the transaction within a time period Δt specified by the requesting user, broadcasting information messageP
(5) after receiving the payment credential
sent by the requesting user P0, responding, by the collaborative user Ai, based on whether the corresponding remuneration is received: if the collaborative user Ai does not receive anonymous transaction remuneration OA
and ending an anonymous transaction process.
Further, the reputation update phase in step 3 includes:
storing information message(·) through a blockchain, jointly verifying, by all nodes in the blockchain, the information by using a consensus characteristic of blockchain nodes, and storing message(·) that passes the verification as reputation evaluation evidence in a block.
A set of the bad user behavior defined in the anonymous set generation phase and the transaction is execution phase is Act={message(¬Δt), message(¬mes), message(¬P), message(¬X), message(¬Num)}. message(¬Δt) indicates that the collaborative user does not finish executing the transaction within the specified time period. message(¬mes) indicates that the user maliciously broadcasts information. message(¬P) indicates that an identity of the user fails verification. message(¬X) indicates that a comprehensive reputation value of the user fails verification. message(¬Num) indicates that a transaction number transmitted by the requesting user or the collaborative user is not true or valid, that is, the requesting user does not transfer anonymous transaction funds, the collaborative user does not execute the anonymous transaction, or the requesting user does not pay remuneration to the collaborative user.
An incentive factor p and a penalty factor n are set to be constant. αPt increases by 1 when a user honestly participates in an anonymous transaction as a collaborative user. However, a cumulative quantity of times of βPt is determined based on impact of bad behavior of the user on the anonymous transaction. message(¬Δt) has minimum impact because the collaborative user honestly executes the anonymous transaction but does not finish executing the anonymous transaction within a time period given by the requesting user, and is regarded as one time of bad behavior. message(¬mes) indicates that the user maliciously slanders another user and is regarded as two times of bad behavior. The bad behavior message(¬P) or message(¬X) has relatively small impact because the bad behavior occurs before the anonymous set is generated, the requesting user has not paid an anonymous transaction amount, and the collaborative user has not executed the anonymous transaction, and is regarded as two times of bad behavior. The bad behavior message(¬Num) has large impact because the bad behavior occurs in a process of executing the anonymous transaction, and is regarded as three times of bad behavior; and
An instantaneous reputation value XP
for calculating the instantaneous reputation value of the requesting user, a formula
for calculating the instantaneous reputation value of the network user, and a formula
for calculating the instantaneous reputation value of the collaborative user in the reputation evaluation model, and uploaded to the blockchain to update the reputation values of the users.
Another objective of the present disclosure is to provide a system for protecting location privacy in mobile payment, using the method for protecting location privacy in mobile payment and including:
Another objective of the present disclosure is to provide a computer device. The computer device includes a memory and a processor. The memory stores a computer program. The computer program, when executed by the processor, enables the processor to perform steps of the method for protecting location privacy in mobile payment.
Another objective of the present disclosure is to provide a computer-readable storage medium, storing a computer program. The computer program, when executed by a processor, enables the processor to perform steps of the method for protecting location privacy in mobile payment.
Another objective of the present disclosure is to provide an information data processing terminal. The information data processing terminal is configured to implement the system for protecting location privacy in mobile payment.
In combination with the foregoing technical solutions and the technical problems to be resolved, the technical solutions provided in the present disclosure have the following advantages and positive effects:
Firstly, in view of the foregoing technical problems in the prior art and difficulties in resolving the problems, in close combination with the technical solutions provided in the present disclosure and results, data, and the like in research and development processes, detailed and profound analysis is made on how to resolve the technical problems through the technical solutions of the present disclosure and some creative technical effects after the problems are resolved. The specific description is as follows:
Mobile payment has quickly become a mainstream payment method in society with its own convenience. However, because a mobile payment platform grasps a large amount of user transaction information and store location information, the platform can determine a specific consumption location of a user. Therefore, when users enjoy the convenience of mobile payment, there are leakage risks of location privacy. However, location privacy protection technologies for mobile payment are quite scarce. Most of existing location privacy protection methods are oriented toward LBS scenarios and are not suitable for mobile payment environments. To resolve the problem, the present disclosure introduces the decentralized coin mixing idea into mobile payment, and inserts the anonymous set constructed by the collaborative users between the user and the merchant to cut off the direct transaction association between the user and the merchant and implement transaction anonymization. This further disturbs a mapping relationship between the user and the consumption location thereof, and protects location information security of the user. In addition, in view of a deficiency of an existing decentralized coin mixing scheme in generating an anonymous set, the anonymous transaction scheme based on reputation evaluation and a double auction is designed in the present disclosure to resolve a problem of lack of trust commonly existing in decentralized structures. The present disclosure can help the requesting user construct the anonymous set that meets the privacy requirement and the reputation requirement of the requesting user while effectively promoting users to participate in anonymous transactions, to improve transaction anonymity and practicability of the scheme. Theoretical analysis and experimental results both show that the scheme for protecting location privacy in mobile payment proposed in the present disclosure can implement both anonymity and practicality, and effectively protect location privacy and security of mobile payment users.
In the present disclosure, the anonymous transaction model in the mobile payment environment is constructed based on the decentralized coin mixing idea. The anonymous set constructed by the collaborative users is introduced to help the user complete account payment, to cut off a direct transaction association between the user and the merchant, implement transaction anonymization of mobile payment, and protect user location information security. The present disclosure proposes the anonymous transaction scheme based on reputation evaluation and a double auction and provides the user reputation evaluation model. A relationship chain is established among user behavior, user reputations, and user profits and losses. If the user has bad behavior, the reputation value of the user is reduced. The lower the reputation value, the more difficult it is for the collaborative user to obtain the collaboration task in the double auction. Even if the task is completed, less remuneration can be obtained. When the collaborative user serves as a requesting user, it is difficult to generate an anonymous set through a double auction. Even if the anonymous set is generated, higher fees need to be paid to a collaborative user who provides help. Therefore, the anonymous transaction scheme proposed in the present disclosure can improve participation enthusiasm and honesty of users, help the requesting user construct the anonymous set that meets the privacy requirement, the reputation requirement, and the bid standard of the requesting user, and improve transaction anonymity, to effectively protect location information security of the users.
In view of a problem that location privacy leakage of mobile payment users cannot be resolved in the prior art, the anonymous transaction model in the mobile payment environment is constructed based on the decentralized coin mixing idea in the present disclosure. Location privacy and security of users is protected by implementing transaction anonymization. However, in the existing decentralized coin mixing scheme, because reputations of the collaborative users are not measured when the anonymous set is constructed, the final generated anonymous set may include low-reputation collaborative users. Existence of the low-reputation collaborative user increases leakage risks of the requesting user's information, greatly reduces transaction anonymity, and even exposes actual transaction information of the requesting user. Therefore, the existing decentralized coin mixing scheme cannot effectively protect location privacy of mobile payment users. To resolve the problem, the present disclosure first proposes the user reputation evaluation scheme to help the requesting user identify the low-reputation collaborative users and avoid selecting such collaborative users to construct the anonymous set. Then, the anonymous transaction scheme based on reputation evaluation and a double auction is proposed to promote users to actively participate in anonymous transactions and honestly execute collaboration tasks by establishing the relationship between the user reputation and the auction bid. A double auction is used to help the requesting user construct the anonymous set that meets the privacy requirement, the reputation requirement, and the bid standard of the requesting user. This improves anonymity of the requesting user's transaction and effectively resolves the location privacy leakage problem caused by exposure of transaction information of the requesting user. It can be found from theoretical analysis of the scheme and a large quantity of experimental results that the present disclosure can not only efficiently help the requesting user generate the anonymous set, but also improve transaction anonymity and protect location privacy and security of users.
Secondly, the technical solutions are considered as a whole or from the perspective of a product, and technical effects and advantages of the technical solutions provided in the present disclosure are specifically described as follows:
The present disclosure is the first location privacy protection scheme proposed for the mobile payment environment, innovatively introduces the decentralized coin mixing idea into the mobile payment environment, proposes that a physical relation between the user and the consumption location thereof is removed through the anonymous transaction such that the mobile payment platform cannot speculate, through information already grasped, who is the user who consumes at the store location, to protect location information security of mobile payment users. To resolve the deficiency of the existing decentralized coin mixing scheme in constructing the anonymous set, the anonymous transaction scheme based on reputation evaluation and a double auction is designed in the present disclosure to resolve a problem of lack of trust commonly existing in distributed system structures. While users are effectively promoted to participate in anonymous transactions, user behavior is restricted, and anonymity and practicability of the scheme are improved. Theoretical analysis and experimental results both show that the privacy protection scheme proposed in the present disclosure can implement both anonymity and practicality, and effectively protect location privacy of mobile payment users.
Thirdly, auxiliary evidence for inventiveness of claims of the present disclosure is further reflected in important aspects as follows:
(1) The expected profits and commercial value of the technical solutions of the present disclosure after transformation are as follow:
At present, mobile payment has become the mainstream payment method in the current society. According to the latest data released by China Internet Network Information Center (CNNIC) and People's Bank of China, by December 2022, a quantity of online payment users in China has reached 911 million, with a total of 158.507 billion mobile payment transactions and a total transaction amount of 499.62 trillion yuan. Apparently, mobile payment has become the most commonly used means of payment in people's daily lives. In addition, people's awareness and demand for personal privacy protection are growing with promulgation and implementation of the Personal Information Protection Law of the People's Republic of China, the Data Security Law, and the Regulations on the Security Protection of Critical Information Infrastructure. Therefore, a potential location privacy leakage issue in the mobile payment environment has received widespread attention, which is one of key issues restricting sustainable and healthy development of the mobile payment industry. The present disclosure can effectively protect location privacy and security of a user when mobile payment is used, can be widely used in the mobile payment industry, and has high expected profits and commercial value.
(2) The technical solutions of the present disclosure fill the technical gap in the industry throughout the world:
The technical solutions provided in the present disclosure fills a gap of a location privacy protection technology in the mobile payment field around the world, breaks through defects and deficiencies in the existing anonymous transaction scheme, and provides an effective solution to the location privacy leakage problem of mobile payment users. In the present disclosure, the anonymous transaction model in the mobile payment environment is constructed based on the decentralized coin mixing idea. Location privacy and security of users is protected by implementing transaction anonymization. In addition, in view of the deficiency of the existing decentralized coin mixing scheme in constructing the anonymous set, the anonymous transaction scheme based on reputation evaluation and a double auction is designed in the present disclosure to resolve the problem of lack of trust in a distributed system architecture. The method can effectively promote users to participate in anonymous transactions, restrict user behavior, improve anonymity and practicability of the scheme, and effectively protect location privacy and security of mobile payment users.
(3) The technical solutions of the present disclosure resolve the technical problems that people have been eager to resolve but have not been successfully resolved:
Anonymous cryptocurrency relies on the complex cryptography technology, making overall efficiency of the scheme low. The centralized coin mixing scheme with the introduction of a third-party mixing server has the problems of a single point of failure and a performance bottleneck. In contrast, the decentralized coin mixing scheme has advantages of simple deployment and good performance. However, although a corresponding accountability mechanism is designed in the existing decentralized coin mixing scheme to restrict behavior of nodes, credibility of the nodes is not measured when an anonymous set is constructed. If a node with low credibility is introduced to participate in coin mixing, risks of the node maliciously leaking user information increase. This reduces anonymity of the scheme. Therefore, in view of the problem that the existing anonymous transaction schemes cannot effectively implement anonymous transactions of mobile payment users, in the present disclosure, the user reputation evaluation scheme is first designed, and the functional relationship between the historical behavior of the user and the reputation value of the user is established. The anonymous set generation scheme based on reputation evaluation and a double auction is proposed to help the user select collaborative users with high reputations and low bids to construct the anonymous set. The present disclosure uses the foregoing method to help the requesting user construct the anonymous set that meets the privacy requirement, the reputation requirement, and the bid standard of the requesting user, restrict behavior of collaborative users when the collaborative users participating in anonymous transactions, and improve anonymity and practicability of the scheme, to effectively protect location privacy of mobile payment users.
(4) The technical solutions of the present disclosure overcome the following technical prejudice:
The existing decentralized coin mixing schemes consider possible bad behavior of users when the users participating in anonymous transactions, and design a corresponding accountability mechanism. However, because the reputations of the collaborative users are not evaluated when the anonymous set is constructed, the final generated anonymous set still includes low-reputation collaborative users. This increases the the risk of malicious leakage of user transaction information and reduces the anonymity of the scheme. In the present disclosure, the user reputation evaluation scheme is first designed, and the functional relationship between the historical behavior of the user and the reputation value of the user is established. A relationship between user reputations and user profits and losses is established in the auction mechanism. If a user has bad behavior, a reputation value of the user is reduced. The lower the reputation value, the more difficult it is for a collaborative user to obtain a collaboration task in the double auction. Even if the task is completed, less remuneration can be obtained. When the collaborative user serves as a requesting user, it is difficult to generate an anonymous set through a double auction. Even if the anonymous set is generated, higher fees need to be paid to a collaborative user who provides help. Therefore, the scheme proposed in the present disclosure can improve participation enthusiasm and honesty of users, help the requesting user construct the anonymous set that meets the privacy requirement, the reputation requirement, and the bid standard of the requesting user, and improve transaction anonymity, to effectively protect location information security of the users.
To more clearly describe the technical solutions in the embodiments of the present disclosure, a brief introduction to the accompanying drawings required for the embodiments will be provided below. Apparently, the accompanying drawings in the following description show merely some embodiments of the present disclosure. Those of ordinary skill in the art may still derive other drawings from these accompanying drawings without creative efforts.
To make the objectives, technical solutions, and advantages of the present disclosure clearer and more comprehensible, the present disclosure will be further described below in detail in conjunction with embodiments. It should be understood that the specific embodiments described herein are only intended to explain the present disclosure and are not intended to limit the present disclosure.
In view of the problems in the prior art, the present disclosure provides a method and system for protecting location privacy in mobile payment, a medium, a device, and a terminal.
As shown in
S101: An anonymous transaction model and a reputation evaluation model in a mobile payment environment are constructed, a user reputation evaluation scheme is designed, and a reputation value of a user is measured based on historical behavior of the user.
S102: An anonymous transaction scheme based on reputation evaluation and a double auction is designed, and a functional relationship between the reputation value of the user and an auction bid is established.
S103: Candidate collaborative users who meet a reputation requirement, a privacy requirement and a bid standard of a requesting user are selected through the double auction to construct an anonymous set.
S104: The anonymous set constructed by collaborative users is inserted between the user and a merchant to cut off a direct transaction association between the user and the merchant and implement transaction anonymization.
As a preferred embodiment, as shown in
Step 1: In an anonymous set generation phase, a mutual relationship between users is described from a perspective of a supply-demand relationship, and the anonymous set is generated for the requesting user through a double auction mechanism in the present disclosure.
Step1: Before executing a mobile payment transaction, the requesting user P0 broadcasts a collaboration request QP
Step2: After receiving the collaboration request QP
(1) If VerP
If
indicating that the identity and the comprehensive reputation value of the requesting user both pass the verification, the network user may determine, based on a bid base OP
If
indicating that the comprehensive reputation value of the requesting user fails the verification, the network user Pj broadcasts information messageP
(2) If VerP
Ver(·) is a verification function. VerP
Step3: The requesting user P0 verifies correctness of the reply RP
(1) If VerP
If
indicating that the comprehensive reputation value of the network user also passes the verification, the requesting user takes the network user Pj as a candidate collaborative user.
If
indicating that the comprehensive reputation value of the network user fails the verification, the requesting user P0 broadcasts information messageP
(2) If VerP
Step4: The requesting user P0 ranks the candidate collaborative user in ascending order of the comprehensive reputation value XP
In the anonymous set generation phase, after the network user Pj receives the collaboration request QP
Step 2: In a transaction execution phase, an anonymous transaction is executed based on the anonymous transaction model, which specifically includes:
Step1: The requesting user P0 executes a fund transfer transaction d0(P0A1) and sends a transaction credential
to the collaborative user A1, where
represents a transaction number obtained after the requesting user P0 executes d0(P0A1); and sends a collaboration task
to the collaborative user Ai. add(Ai+1) represents a target address of a transaction to be executed by the collaborative user Ai.
Step2: After receiving the transaction credential
sent by the requesting user P0, the collaborative user A1 verifies authenticity of the transaction credential:
(1) If
the collaborative user verifies the signature information
If
indicating that an identity of and the transaction number transmitted by the requesting user P0 are both true, the collaborative user broadcasts no information; or if
indicating that an identity of the requesting user P0 is forged, the collaborative user broadcasts information messageA
(2) If
indicating that the transaction number transmitted by the requesting user P0 is not true or valid, the collaborative user A1 broadcasts information
without verifying the signature information
The remaining collaborative users who receive the broadcast information messageA
may immediately terminate a collaboration task related to the requesting user.
Step3: After receiving the collaboration task
sent by the requesting user P0, the collaborative user Ai checks whether the information messageA
exists; and if the information exits, terminates the collaboration task; or if the information does not exist, verifies correctness of the signature information SignP
(1) If VerP
and after executing the transaction di(AiAi+1), sends a collaboration credential
to the requesting user P0 to obtain remuneration for executing the anonymous transaction.
(2) If VerP
Execution of an actual transaction D(P0→S) of the requesting user is completed only after all collaborative users Ai in the anonymous set execute the transaction di. That is, ∀Ai∈Set, Ai has executed di(AiAi+1)⇔D(P0ΔS) is completed.
Step4: After receiving the collaboration credential
sent by the collaborative user Ai, the requesting user P0 verifies the collaboration credential:
(1) If
the requesting user verifies the signature information
If
indicating that a transaction number transmitted by the collaborative user Ai is true and valid and an identity of the collaborative user passes the verification, the requesting user executes a remuneration transaction
and sends a payment credential
to the collaborative user Ai.
If
indicating that an identity of the collaborative user Ai is forged, the requesting user broadcasts information messageP
(2) If
indicating that a transaction number transmitted by the collaborative user Ai is not true or valid, the requesting user P0 broadcasts information
without verifying the signature information
If the anonymous transaction is successfully completed but the collaborative user Ai does not finish executing the transaction within a time period Δt specified by the requesting user, the requesting user broadcasts information messageP
Step5: After receiving the payment credential
sent by the requesting user P0, the collaborative user Ai responds based on whether the corresponding remuneration is received: if the collaborative user Ai does not receive anonymous transaction remuneration OA
An anonymous transaction process ends when the foregoing 5 steps are smoothly performed.
Step 3: Reputation update phase
Reputations of the users are updated based on the reputation evaluation scheme and bad user behavior defined in the anonymous set generation phase and the transaction execution phase. Considering a problem that the requesting user P0, network user Pj, or collaborative user Ai may maliciously broadcast information message(·) in practical application, the information message(·) is stored through a blockchain. All nodes in the blockchain jointly verify the information by using a consensus characteristic of blockchain nodes. Only message(·) that passes the verification can be stored as reputation evaluation evidence in a block.
A set of the bad user behavior defined in the anonymous set generation phase and the transaction is execution phase
Act={message(¬Δt), message(¬mes), message(¬P), message(¬X), message(¬Num)}. message(¬Δt) indicates that the collaborative user does not finish executing the transaction within the specified time period. message(¬mes) indicates that the user maliciously broadcasts information. message(¬P) indicates that an identity of the user fails verification. message(¬X) indicates that a comprehensive reputation value of the user fails verification. message(¬Num) indicates that a transaction number transmitted by the requesting user or the collaborative user is not true or valid, that is, the requesting user does not transfer anonymous transaction funds, the collaborative user does not execute the anonymous transaction, or the requesting user does not pay remuneration to the collaborative user.
In the present disclosure, an incentive factor p and a penalty factor n are set to be constant. αPt increases by 1 when a user as a collaborative user honestly participates in an anonymous transaction. However, a cumulative quantity of times of βPt is determined based on impact of bad behavior of the user on the anonymous transaction. Apparently, message(¬Δt) has minimum impact because the collaborative user honestly executes the anonymous transaction but does not finish executing the anonymous transaction within a time period given by the requesting user, and is regarded as one time of bad behavior. message(¬mes) indicates that the user maliciously slanders another user and is regarded as two times of bad behavior. The bad behavior such as message(¬P) or message(¬X) has relatively small impact because the bad behavior occurs before the anonymous set is generated, the requesting user has not paid an anonymous transaction amount, and the collaborative user has not executed the anonymous transaction, and is regarded as two times of bad behavior. The bad behavior message(¬Num) occurs in a process of executing the anonymous transaction, brings very bad consequences regardless of whether the requesting user or the collaborative user has the bad behavior, and is regarded as three times of bad behavior.
Finally, an instantaneous reputation value XP
for calculating the instantaneous reputation value of the requesting user, a formula
for calculating the instantaneous reputation value of the network user, and a formula
for calculating the instantaneous reputation value of the collaborative user in the reputation evaluation model, and uploaded to the blockchain to update the reputation values of the users.
As shown in
In the present disclosure, an anonymous transaction model in a mobile payment environment is constructed based on a decentralized coin mixing idea, as shown in
A set of all users in a network is U={P0, P1, P2, . . . , Pn, . . . , Pm}. The requesting user P0 is an initiator of an anonymous transaction. To protect location information of the requesting user from being leaked in a transaction process, the requesting user sends an anonymous transaction collaboration request QP
The collaborative user Ai is a participant in the anonymous transaction and obtains remuneration by providing a collaboration service to the requesting user. After receiving the specific collaboration task di(Ai→Ai+1) sent by the requesting user P0, the collaborative user Ai transfers a fixed amount of funds to an account of Ai+1 based on collaboration content. The collaborative user of the current transaction may be a requesting user of a next transaction. The merchant S is an actual recipient of the anonymous transaction, does not participate in a specific execution process of the anonymous transaction, and serves only as a final recipient of the funds.
In the present disclosure, the reputation evaluation model is designed to comprehensively consider impact of the historical behavior of the user in an anonymous transaction process on the reputation value of the user and improve reliability of a decentralized system.
It is assumed that within a discrete time period T={1, 2, . . . , t, . . . }, the requesting user P0 broadcasts the collaboration request QP
If the network user Pj has behavior of falsifying information during response to the requesting user P0, a reputation value of the network user should be reduced as a penalty. A formula for measuring an instantaneous reputation value XP
If the collaborative user Ai leaks the specific collaboration task di(Ai→Ai+1) issued by the requesting user P0, or delays or interrupts execution of the collaboration task, a reputation value of the collaborative user should be reduced as a penalty. If the collaborative user honestly executes the collaboration task, the reputation value of the collaborative user should be increased as a reward. A formula for measuring an instantaneous reputation value XA
p is an incentive factor. n is a penalty factor. αPt is a cumulative quantity of times the user honestly participates in anonymous transactions by t. βPt is a cumulative quantity of times the user has bad behavior by t. To further prevent users from having bad behavior, let 0<p«n<1, and prompt a self-interested user to adhere to rational consensus by increasing a penalty. It can be learned from the formula that the instantaneous reputation value of the user meets a condition 0≤XP(t)≤1. Therefore, an initial reputation value XP(0) of the user can be set to 0.5.
To improve accuracy of evaluating the historical behavior of the user, each instantaneous reputation value XP(t) of the user in the anonymous transaction process should be fused to calculate a comprehensive reputation value. Because importance of each instantaneous reputation value XP(t) decreases over time t, the closer the instantaneous reputation value is to a current moment, the more it reflects a true reputation of the user. Therefore, in the present disclosure, a quadratic decreasing function is used to define a weight of each instantaneous reputation value XP(t) of the user in the comprehensive reputation value as follows:
where T is the current moment, and Γ is a validity period of the reputation value. When t=T, ω(XP(t))=1. When XP(t) is a reputation value at the current moment, a weight of the reputation value in the comprehensive reputation value is 1. When 0≤t≤T−Γ, ω(XP(t))=0, indicating that a reputation value at a moment with an interval to the current moment T exceeding the validity period Γ is not used for evaluation, to improve accuracy of real-time user reputation evaluation. The comprehensive reputation value of the user is finally obtained through a weighted average sum method as follows:
It is assumed that in the network, n requesting users U={P0, P1, P2, . . . , Pn} are waiting for anonymous services and m network users U′={Pn+1, Pn+2, . . . , Pn+m} are waiting to receive collaboration tasks. Each requesting user Pi∈U broadcasts a collaboration request QP
The bid base OP
φ(Δt) is a decreasing function. A bid OP
After receiving the collaboration request QP
When an anonymous set is generated through an existing decentralized coin mixing scheme, due to a lack of reputation measurement for collaborative users, the generated anonymous set may include low-reputation collaborative users. The low-reputation collaborative users are very likely to leak transaction information of a requesting user for their own interests, or even attempt to steal funds of the requesting user. If the requesting user executes a transaction mixing process by using the anonymous set generated through the existing scheme, existence of the low-reputation collaborative users greatly reduces transaction anonymity, and may even expose actual transaction parties. To resolve this problem, as shown in
In the present disclosure, a mutual relationship between users is described from a perspective of a supply-demand relationship, and an anonymous set is generated for a requesting user through a double auction mechanism, as shown in
Step1: Before executing a mobile payment transaction, the requesting user P0 broadcasts a collaboration request QP
Step2: After receiving the collaboration request QP
(1) If VerP
If
indicating that the identity and the comprehensive reputation value of the requesting user both pass the verification, the network user may determine, based on a bid base OP
If
indicating that the comprehensive reputation value of the requesting user fails the verification, the network user Pj broadcasts information messageP
(2) If VerP
Ver(·) is a verification function. VerP
Step3: The requesting user P0 verifies correctness of the reply RP
(1) If VerP
If
indicating that the comprehensive reputation value of the network user also passes the verification, the requesting user takes the network user Pj as a candidate collaborative user.
If
indicating that the comprehensive reputation value of the network user fails the verification, the requesting user P0 broadcasts information messageP
(2) If VerP
Step4: The requesting user P0 ranks the candidate collaborative user in ascending order of the comprehensive reputation value XP
In the anonymous set generation phase, after the network user Pj receives the collaboration request QP
Based on an anonymous transaction model, an anonymous transaction execution phase mainly includes the following 5 steps. An execution process is shown in
Step1: The requesting user P0 executes a fund transfer transaction d0(P0A1) and sends a transaction credential
to the collaborative user A1, where
represents a transaction number obtained after the requesting user P0 executes d0(P0A1); and sends a collaboration task
to the collaborative user Ai, add(Ai+1) represents a target address of a transaction to be executed by the collaborative user Ai.
Step2: After receiving the transaction credential
sent by the requesting user P0, the collaborative user A1 verifies authenticity of the transaction credential:
(1) If
the collaborative user verifies the signature information
If
indicating that an identity of and the transaction number transmitted by the requesting user P0 are both true, the collaborative user broadcasts no information; or if
indicating that an identity of the requesting user P0 is forged, the collaborative user broadcasts information messageA
(2) If
indicating that the transaction number transmitted by the requesting user P0 is not true or valid, the collaborative user A1 broadcasts information
without verifying the signature information
The remaining collaborative users who receive the broadcast information messageA
may immediately terminate a collaboration task related to the requesting user.
Step3: After receiving the collaboration task
sent by the requesting user P0, the collaborative user Ai checks whether the information messageA
exists; and if the information exists, terminates the collaboration task; or if the information does not exist, verifies correctness of the signature information SignP
(1) If VerP
and after executing the transaction di(AiAi+1), sends a collaboration credential
to the requesting user P0 to obtain remuneration for executing the anonymous transaction.
(2) If VerP
Execution of an actual transaction D(P0→S) of the requesting user is completed only after all collaborative users Ai in the anonymous set execute the transaction di. That is, ∀Ai∈Set, Ai has executed di(AiAi+1)⇔D(P0→S) is completed.
Step4: After receiving the collaboration credential
sent by the collaborative user Ai, the requesting user P0 verifies the collaboration credential:
(1) If
the requesting user verifies the signature information
If
indicating that a transaction number transmitted by the collaborative user Ai is true and valid and an identity of the collaborative user passes the verification, the requesting user executes a remuneration transaction
and sends a payment credential
to the collaborative user Ai.
If
indicating that an identity of the collaborative user Ai is forged, the requesting user broadcasts information messageP
(2) If
indicating that a transaction number transmitted by the collaborative user Ai is not true or valid, the requesting user P0 broadcasts information
without verifying the signature information
If the anonymous transaction is successfully completed but the collaborative user Ai does not finish executing the transaction within a time period Δt specified by the requesting user, the requesting user broadcasts information messageP
Step5: After receiving the payment credential
sent by the requesting user P0, the collaborative user Ai responds based on whether the corresponding remuneration is received: if the collaborative user Ai does not receive anonymous transaction remuneration OA
An anonymous transaction process ends when the foregoing 5 steps are smoothly performed.
Update reputations of the users based on the reputation evaluation scheme and bad user behavior defined in the anonymous set generation phase and the transaction execution phase. Considering a problem that the requesting user P0, network user Pj, or collaborative user Ai may maliciously broadcast information message(·) in practical application, the information message(·) is stored through a blockchain in the present disclosure. All nodes in the blockchain jointly verify the information by using a consensus characteristic of blockchain nodes. Only message(·) that passes the verification can be stored as reputation evaluation evidence in a block.
A set of the bad user behavior defined in the anonymous set generation phase and the transaction execution phase is
Act={message(¬Δt), message(¬mes), message(¬P), message(¬X), message(¬Num)}. message(¬Δt) indicates that the collaborative user does not finish executing the transaction within the specified time period. message(¬mes) indicates that the user maliciously broadcasts information. message(¬P) indicates that an identity of the user fails verification. message(¬X) indicates that a comprehensive reputation value of the user fails verification. message(¬Num) indicates that a transaction number transmitted by the requesting user or the collaborative user is not true or valid, that is, the requesting user does not transfer anonymous transaction funds, the collaborative user does not execute the anonymous transaction, or the requesting user does not pay remuneration to the collaborative user.
In the present disclosure, an incentive factor p and a penalty factor n are set to be constant. αPt increases by 1 when a user as a collaborative user honestly participates in an anonymous transaction. However, a cumulative quantity of times of βPt is determined based on impact of bad behavior of the user on the anonymous transaction. Apparently, message(¬Δt) has minimum impact because the collaborative user honestly executes the anonymous transaction but does not finish executing the anonymous transaction within a time period given by the requesting user, and is regarded as one time of bad behavior. message(¬mes) indicates that the user maliciously slanders another user and is regarded as two times of bad behavior. The bad behavior such as message(¬P) or message(¬X) has relatively small impact because the bad behavior occurs before the anonymous set is generated, the requesting user has not paid an anonymous transaction amount, and the collaborative user has not executed the anonymous transaction, and is regarded as two times of bad behavior. The bad behavior message(¬Num) occurs in a process of executing the anonymous transaction, brings very bad consequences regardless of whether the requesting user or the collaborative user has the bad behavior, and is regarded as three times of bad behavior.
Finally, an instantaneous reputation value XP
for calculating the instantaneous reputation value of the requesting user, a formula
for calculating the instantaneous reputation value of the network user, and a formula
for calculating the instantaneous reputation value of the collaborative user in the reputation evaluation model, and uploaded to the blockchain to update the reputation values of the users.
In the present disclosure, the requesting user P0, network user Pj, and collaborative user Ai are all set as rational and self-interested users based on an individual rationality principle. That is, the requesting user, network user, and collaborative user always select a strategy of a utility function UtiP≥0 when participating in an anonymous transaction, and all strive to maximize the utility function UtiP. Therefore, in the present disclosure, the utility function UtiP of the user when different strategies are used is calculated to analyze whether the scheme satisfies an incentive compatibility constraint, to ensure that each user can obtain maximum profits only when honestly participating in the anonymous transaction.
A profit of the requesting user P0 for a successful anonymous transaction T(P0→S) is F. A loss for an unsuccessful anonymous transaction ¬T(P0→S) is F. A profit of the collaborative user for leaking transaction information of the requesting user is L. That is, a loss when the transaction information of the requesting user is leaked is L. A cost of the collaborative user for executing the anonymous transaction is J. Remuneration of the collaborative user for executing the anonymous transaction is a bid OA
Lemma 1: The requesting user P0 can obtain the maximum utility function UtiP
Proof: Analyze, based on the foregoing scheme execution process, strategies CP
The strategy cP
If only m (m<k) collaborative users complete collaboration tasks, uP
Apparently, through analysis only of single-round profits, the requesting user can obtain the greatest profit when using the strategy cP
However, when the requesting user P0 initiates another collaboration request, it is difficult to generate an anonymous set because the reputation value of the requesting user is reduced due to the bad behavior. In this case, uP
An occurrence probability of T(P0→S) is much lower than an occurrence probability of ¬T(P0→S). It can be learned through analysis of two rounds of profits that uP
It can be learned based on k*OA
That is, the requesting user obtains maximum profits if the requesting user honestly executes anonymous transactions.
In conclusion, the lemma 1 is proved.
Lemma 2: The network user Pj can obtain the maximum utility function UtiP
Proof: Analyze, based on the foregoing scheme execution process, strategies CP
The strategy cP
In conclusion, the lemma 2 is proved.
Lemma 3: The collaborative user Ai can obtain the maximum utility function UtiA
Proof: Analyze, based on the foregoing scheme execution process, strategies CA
The strategy cA
According to the lemma 1, when the collaborative user who uses the strategy cA
that mid(uA
In conclusion, the lemma 3 is proved.
The following theorem can be obtained by proving the lemmas 1, 2, and 3.
Theorem 1: When the requesting user P0, network user Pj, and collaborative user Ai are rational and self-interested users, honestly participating in anonymous transactions is the best strategy they can select. Therefore, the scheme proposed in the present disclosure satisfies the incentive compatibility constraint. The network user can be promoted to positively respond to the collaboration request of the requesting user. The requesting user is helped to construct the anonymous set that meets the privacy requirement and reputation requirement of the requesting user. In addition, behavior of the user in the anonymous transaction process is restricted and honesty of the user is improved.
This section mainly analyzes an ability of the scheme to respond to an attack. Attacks may be classified into an internal attack, an external attack, a collusion attack, free-rider behavior induced by an incentive mechanism, and the like based on sources and properties of the attacks.
The collaborative user Ai in the anonymous transaction model is untrusted and even likely to be malicious. To maximize profits of the collaborative user, the collaborative user may leak the collaboration task
sent by the requesting user to the collaborative user, for an additional profit L; or may steal funds M transferred by the requesting user to an account of the collaborative user, without providing any service. In addition, a lazy collaborative user may intentionally delay a service time to reduce execution efficiency of the scheme. Based on incentive compatibility, the collaborative user harms the interests of the collaborative user when taking these malicious actions. Reduction in the reputation of the collaborative user also puts the collaborative user at a disadvantage in a double auction. Therefore, the anonymous transaction scheme based on reputation evaluation and a double auction proposed in the present disclosure can restrict behavior of collaborative users, to better resist internal attacks.
A malicious attacker may forge identities of a plurality of network users to receive collaboration requests from a target user, hoping to join an anonymous set to obtain collaboration task information
issued by a requesting user, and recover actual transaction information D(P0→S) of the requesting user by obtaining as much collaboration task information as possible. Apparently, a possibility that the malicious attacker identifies both parties of the actual transaction is affected by a privacy requirement k of the requesting user P0. When k=1, the actual transaction D(P0→S) may be transformed into d0(P0→A1)·d1(A1→S). The attacker only needs to forge an identity of a collaborative user A1 to easily obtain information about both parties of the actual transaction. Assuming that a cost of the attacker in this case is H, a possibility of forging an identity to become the collaborative user A1 is h−1. When k=n, the attacker needs to forge identities of n collaborative users to break transaction anonymity. A cost nH of the attacker is huge and a possibility h−n is very low. Therefore, as the privacy requirement k of the requesting user increases, the attacker needs to pay more to launch a Sybil attack, and a possibility of success of the attack is lower. In addition, the double auction mechanism makes generation of the anonymous set Set more random, resulting in a very low possibility that the attacker can join the anonymous set of the target user. Therefore, the scheme proposed in the present disclosure can effectively handle Sybil attacks.
A single collaborative user Ai can obtain only some transaction information di(AiAi+1). Therefore, the collaborative user tries to collude with other collaborative users, integrate information obtained by the collaborative users to infer an actual transaction T(P0→S) of a requesting user P0, and destroy transaction anonymity. However, only the requesting user P0 knows which collaborative users are included in an anonymous set Set and where the collaborative users are located in a transaction link. The collaborative user Ai knows only an account address of Ai+1. Therefore, it is difficult for collaborative users to reach collusion. In addition, as a privacy requirement k of the requesting user increases, a possibility of collusion among the collaborative users further decreases.
Based on the foregoing analysis, it is difficult for an attacker to steal information by forging an identity to join an anonymous set of a target user. It is also difficult for collaborative users to reach collusion. However, when an attacker colludes with a collaborative user, the attacker can obtain some transaction information di(AiAi+1) obtained after division by a requesting user P0, without joining the anonymous set. Because an actual transaction T(P0→S) is divided into k+1 transactions, the attacker needs to collude with k collaborative users to break transaction anonymity. However, the double auction mechanism makes this unlikely to happen. In addition, the scheme in the present disclosure satisfies the incentive compatibility constraint. The collaborative users all choose to honestly participate in anonymous transactions to obtain maximum profits. Therefore, it is extremely unlikely that the attacker can collude with the collaborative users and obtain actual transaction information of the requesting user.
The requesting user P0 may collude with the collaborative user A1 to deceive the other collaborative users into helping the requesting user complete an anonymous transaction without transferring anonymous transaction funds M. Because the collaborative user A1 needs to verify a fund transfer transaction d0(P0A1) of the requesting user P0, if the collaborative user colludes with the requesting user, the collaborative user broadcasts a false message to deceive the other collaborative users {A2 . . . , Ai, . . . , Ak} into executing collaboration tasks issued by the requesting user. In this case, D(P0→S)⇔d0(P0⊗A1)·d1(A1⊗A2)· . . . ·dk−1(Ak−1→Ak)·dk(Ak→S). However, because broadcast information message(·) needs to be jointly verified by blockchain nodes, it is apparent that false information cannot pass verification. In addition, information verified as false information is used as a credential for punishing the requesting user P0 and the collaborative user A1. Therefore, the rational requesting user P0 and collaborative user A1 do not choose to launch a collusion attack in order not to reduce their reputations.
Free-rider behavior means that a user can enjoy a same service as the other users without any costs. In the present disclosure, free-rider behavior means that a user can generate an anonymous set as a requesting user without serving as a collaborative user to help a requesting user execute an anonymous transaction. The anonymous transaction scheme based on reputation evaluation and a double auction provided in the present disclosure can effectively reduce occurrence of free-rider behavior. If a user does not participate in construction of an anonymous set, a reputation value of the user is always in an initial state. When the user broadcasts a collaboration request as a requesting user, it is difficult to generate an anonymous set that meets a privacy requirement and a reputation requirement of the user. Even if the anonymous set is generated, the user needs to pay high remuneration to collaborative users. If a low-reputation collaborative user in the anonymous set has bad behavior, the requesting user faces greater privacy leakage risks and economic losses. Therefore, rational users actively participate in anonymous transactions to enhance their reputation values to reduce risks they face in the anonymous transactions as much as possible.
In conclusion, the scheme provided in the present disclosure can effectively handle the foregoing possible attacks.
To prove the inventive step and the technical value of the technical solutions of the present disclosure, this section is an application embodiment of the technical solutions in the claims on specific products or related technologies.
With continuous popularization of intelligent terminal devices and development and innovation of a mobile payment technology, application scenarios of mobile payment gradually tend to be diversified and vertical, covering all aspects of people's daily lives, and mobile payment has become a mainstream payment method in society. However, privacy security issues of mobile payment are constantly emerging while the mobile payment industry is generally booming. In a real scenario, when a user uses mobile payment for account settlement in a store, because a geographical location of the store is relatively fixed, a payment platform can easily determine a physical relation between the user and the consumption location thereof based on user transaction information grasped by the payment platform and store location information provided by a merchant. Therefore, people are facing leakage risks of personal privacy information while enjoying convenience of mobile payment. Existing technical solutions cannot resolve a location privacy leakage problem in mobile payment. The anonymous set generation scheme based on reputation evaluation and a double auction in the present disclosure can help the requesting user construct the anonymous set that meets the privacy requirement, reputation requirement, and bid standard of the requesting user. The direct transaction association between the user and the merchant can be cut off by introducing the anonymous set constructed by collaborative users, to implement transaction anonymization of mobile payment and further protect location information security of the mobile payment user.
In this experiment, an elliptic curve public key cryptographic algorithm SM2 issued by the State Cryptography Administration of China is used to encrypt and sign information in an anonymous transaction process. The Java programming language is used to implement the elliptic curve public key cryptographic algorithm SM2 based on elliptic curves and a distributed double auction algorithm. An experimental environment is 11th Gen Intel® Core™ i5-1135G7@2.40 GHz (8 CPUs),˜2.4 GHz 8192 MB RAM, and an operating system is Windows10-64 bit.
In this part of the experiment, a condition that a network user Pj automatically responds to a requesting user Pi is |XP
When the requesting user implements an anonymous transaction through the scheme in the present disclosure, the average computation delay and communication overhead required to generate the anonymous set both increase as the privacy requirement K of the requesting user increases. However, the privacy requirement K of the requesting user does not affect the average computation delay and communication overhead required by the candidate collaborative user. A reason for the foregoing phenomenon is that as K increases, the requesting user needs to receive messages sent by more candidate collaborative users. In addition, a quantity of times decryption is performed to obtain message content of the candidate collaborative users and signature data of the candidate collaborative users is verified increase such that the computation delay and communication overhead of the requesting user increase. However, when the reputation value of the requesting user meets the automatic response condition, the candidate collaborative user only needs to generate ciphertext of reply content of the candidate collaborative user by using a public key of the requesting user, and then send the ciphertext and signature data corresponding to the ciphertext to the requesting user. Therefore, the average computation delay and communication overhead required by the candidate collaborative user in the anonymous set generation process are independent of K.
It can be found from experimental data that when the requesting user generates the anonymous set through the scheme in the present disclosure, the average computation delays and communication overheads required by the requesting user and the candidate collaborative user are limited. When K=20, the average computation delay and average communication overhead required by the requesting user are respectively 744.11 ms is 15.878 KB; and the average computation delay and average communication overhead of the candidate collaborative user are respectively 66.174 ms and 0.941 KB. Therefore, the scheme in the present disclosure can efficiently generate anonymous sets for requesting users.
Average communication overheads required by the requesting user and the collaborative user in the transaction execution phase are analyzed below, as shown in
The present disclosure mainly analyzes impact of a quantity of users in a network on a success rate of generating an anonymous set through the scheme. In the experiment, a condition that a network user Pj automatically responds to a requesting user Pi is set to |XP
This experiment is used to analyze impact of an automatic response condition on a success rate of generating an anonymous set through the scheme. In the experiment, given that there are 100 users in a network, reputation values XP of all users in the network are generated by generating random numbers. Then, different automatic response conditions |XP
It should be noted that the embodiments of the present disclosure may be implemented by hardware, software, or a combination of software and hardware. The hardware part may be implemented through special logic. The software part may be stored in a memory and executed by a suitable instruction execution system, such as a microprocessor or specially designed hardware. Those of ordinary skill in the art can understand that the device and method described above may be implemented through computer-executable instructions and/or embodied in processor control code, and such code is provided, for example, on a carrier medium such as a disk, compact disc (CD) or digital video disc (DVD)-read-only memory (ROM), a programmable memory such as a ROM (firmware), or a data carrier such as an optical or electronic signal carrier. The device of the present disclosure and its modules may be implemented by hardware circuits such as very large-scale integrated circuits (VLSI) or gate arrays, semiconductors such as logic chips and transistors, or programmable hardware devices such as field programmable gate arrays and programmable logic devices, or by software executed by various types of processors, or by a combination of the foregoing hardware circuits and software, such as firmware.
The foregoing descriptions are merely descriptions of the specific embodiments of the present disclosure, and the protection scope of the present disclosure is not limited thereto. Any modification, equivalent replacement, improvement, and the like made within the technical scope of the present disclosure by those skilled in the art according to the spirit and principle of the present disclosure shall fall within the protection scope of the present disclosure.
Number | Date | Country | Kind |
---|---|---|---|
202310547496.3 | May 2023 | CN | national |