Innovative technology protects your location data – this is how it works!

Transparenz: Redaktionell erstellt und geprüft.
Veröffentlicht am

Researchers at the University of Munich are developing innovative zero-knowledge methods for location data protection to combine accuracy and privacy.

Forscher der Uni München entwickeln innovative Zero-Knowledge-Methoden zum Datenschutz bei Standortdaten, um Genauigkeit und Privatsphäre zu vereinen.
Researchers at the University of Munich are developing innovative zero-knowledge methods for location data protection to combine accuracy and privacy.

Innovative technology protects your location data – this is how it works!

Researchers at the Technical University of Munich have developed a groundbreaking process that could revolutionize the protection of privacy when it comes to verifiable location data. At the heart of this innovation is the application of zero-knowledge proofs, which make it possible to confirm the validity of statements about location, but without revealing the exact data. This method represents a significant response to increasing privacy concerns in an increasingly connected world. Jens Ernstberger, lead author of the study, highlights that a key challenge is balancing data protection and precise location information without compromising user privacy.

To achieve this, Ernstberger's research team combines zero-knowledge proofs with an innovative grid model - the so-called hierarchical hexagon grid system. This system segments the Earth's surface into different cells that are designed to provide varying location cues depending on the specific requirements of each application. This gives users the opportunity to reveal their location at different levels of detail, such as city or park level, while their exact position remains anonymous.

The use of zero-knowledge proofs

Zero-knowledge proofs, also known as zero-knowledge proofs, are procedures that allow one party (the prover) to prove to another party (the verifier) ​​that they know a secret without revealing the secret itself. Typical applications of this method can be found in cryptography, for example for authentication in cryptocurrencies such as Zcash or for maintaining anonymity in mobile payment services such as Bluecode. Concerns about data protection have also led to the EU Digital Identification Regulation requiring the use of zero-knowledge protocols in the future EUDI wallet.

These proofs usually work via a question-and-answer protocol, in which the prover can prove to the verifier that he or she knows a secret in three communication steps. A classic example illustrates this: One person (Peggy) wants to demonstrate to another (Viktor) that she knows a secret without directly revealing it. If Peggy succeeds in the required task in several attempts, Viktor can assume with high probability that Peggy actually knows the secret.

Practical implementation challenges

Despite the promising approaches, zero-knowledge protocols often become problematic in practical implementation. They often require a high level of interaction and can be vulnerable to replay attacks. This has led to standardized authentication protocols currently being based more on digital signatures. Nevertheless, zero-knowledge proofs significantly expand interactive proof systems and represent a promising step towards digitally secure solutions.

The developments at the Technical University of Munich are not only technological progress, but also mark an important step in dealing with the tension between data protection and technological possibilities. Jens Ernstberger's research team shows how innovative concepts such as the hexagon grid system combined with zero-knowledge proofs could fundamentally change the way we think about location data.

For further information on developments at the Technical University of Munich, please visit TUM. Detailed explanations of zero-knowledge proofs can be found at Wikipedia.