Journal of Information Security Reserach ›› 2023, Vol. 9 ›› Issue (11): 1076-.

Previous Articles     Next Articles

An Anonymous Whistleblowing Scheme Based on Metadatahiding

Li Mingjie1,2, Jiang Jinjing2, and Liu Jinhui2   

  1. 1(School of Engineering, Guangzhou College of Technology and Business, Guangzhou 510850)
    2(School of Cybersecurity, Northwestern Polytechnical University, Xi’an 710129)

  • Online:2023-11-06 Published:2023-11-30

一种基于元数据隐藏的匿名举报方案

李明杰1,2江津菁2刘金会2   

  1. 1(广州工商学院工学院广州510850)
    2(西北工业大学网络空间安全学院西安710129)

  • 通讯作者: 李明杰 硕士.主要研究方向为密码学应用、隐私保护、区块链技术、联邦学习. li_mingjie@mail.nwpu.edu.cn
  • 作者简介:李明杰 硕士.主要研究方向为密码学应用、隐私保护、区块链技术、联邦学习. li_mingjie@mail.nwpu.edu.cn 江津菁 硕士研究生.主要研究方向为信息安全、物理层安全、无线通信. jinjingjiang2021@163.com 刘金会 博士,副教授,硕士生导师.主要研究方向为密码学、数字签名、数据安全. jh.liu6666@nwpu.edu.cn.

Abstract: The reporting mechanism can play a very important supervisory role in daily life. Now with the development of society, science and technology, anonymous reporting method is looked rather better to protect and respect the privacy and safety of whistleblowers, and online anonymous reporting method provides great convenience. Aiming at the privacy protection and effective incentive of anonymous whistleblower, an anonymous whistleblower method based on distributed point function was proposed. Anonymous informants can hide their reporting information, personal information and location information with the help of distributed point function, and then randomly forward them through the public key algorithm, and finally they are received by the reporting agency. In this process, any forwarding node and malicious attackers can not obtain any information of anonymous informants. In this scheme, no one can obtain the identity information of the anonymous whistleblower in the anonymous reporting process, so as to ensure the anonymity of the whole process, and the random forwarding node can ensure the robustness and stability of the system in the process.

Key words: metadata, anonymous whistleblowing, public key system, distributed point function, identity privacy

摘要: 举报机制在日常生活中能起到非常重要的监督作用,随着社会和科学技术的发展,匿名举报方式更显得能够保护和尊重举报者的隐私和安全,网络匿名举报方式也为人们提供极大便利.针对匿名举报应有的对匿名举报者的隐私保护和有效的激励,提出基于分布式点函数的匿名举报方案.匿名举报者可以借助分布式点函数对举报信息、个人信息和位置信息等进行隐藏,再通过公开的密钥算法进行随机转发,最终被举报受理机构接收.在这个过程中任何转发节点和恶意攻击者都不能获取到匿名举报者的任何信息.该方案中任何人都无法在匿名举报过程中获得匿名举报者的身份信息,从而保证了整个过程的匿名性,随机转发节点能够保证过程中系统的健壮性和稳定性.

关键词: 元数据, 匿名举报, 公钥体制, 分布式点函数, 身份隐私

CLC Number: