[1] LIANG X, ZHANG K, SHEN X, et al. Security and privacy in mobile social networks:challenges and solutions[J]. IEEE Wireless Communications, 2014, 21(1):33-41. [2] HU C, LI R, LI W, et al. Efficient privacy-preserving schemes for dot-product computation in mobile computing[C]//PAMCO 2016:Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing. New York:ACM, 2016:51-59. [3] SHENG G, WEN T, GUO Q, et al. Privacy preserving inner product of vectors in cloud computing[J]. International Journal of Distributed Sensor Networks, 2014, 10(5):537252. [4] ZHANG R, ZHANG J, ZHANG Y, et al. Privacy-preserving profile matching for proximity-based mobile social networking[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9):656-668. [5] LI M, YU S, CAO N, et al. Privacy-preserving distributed profile matching in proximity-based mobile social networks[J]. IEEE Transactions on Wireless Communications, 2013, 12(5):2024-2033. [6] ISHIKURO Y, OMOTE K. Privacy-preserving profile matching protocol considering conditions[C]//Proceedings of the 10th International Conference on Network and System Security, LNSC 9955. Berlin:Springer, 2016:171-183. [7] HE D, CAO Z, DONG X, et al. User self-controllable profile matching for privacy-preserving mobile social networks[C]//Proceedings of the 2014 IEEE International Conference on Communication Systems. Piscataway, NJ:IEEE, 2014:248-252. [8] XIE K, WANG X, LI W, et al. Bloom-filter-based profile matching for proximity-based mobile social networking[C]//Proceedings of the 13th Annual IEEE International Conference on Sensing, Communication, and Networking. Piscataway, NJ:IEEE, 2016:1-9. [9] SAHAI A, WATERS B. Fuzzy identity-based encryption[C]//EUROCRYPT 2005:Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 3494. Berlin:Springer, 2005:457-473. [10] GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security. New York:ACM, 2006:89-98. [11] NISHIDE T, YONEYAMA K, OHTA K. Attribute-based encryption with partially hidden encryptor-specified access structures[C]//ACNS 2008:Proceedings of the 6th International Conference on Applied Cryptography and Network Security, LNCS 5037. Berlin:Springer, 2008:111-129. [12] ZHANG Y, CHEN X, LI J, et al. Anonymous attribute-based encryption supporting efficient decryption test[C]//Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. New York:ACM, 2013:511-516. [13] JUNG T, LI X Y, WAN Z, et al. Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(1):190-199. [14] 解理, 任艳丽. 隐藏访问结构的高效基于属性加密方案[J]. 西安电子科技大学学报(自然科学版), 2015, 42(3):97-102.(XIE L, REN Y L. Efficient attribute-based encryption with hidden access structures[J]. Journal of Xidian University, 2015, 42(3):97-102.) [15] BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[C]//CRYPTO 2001:Proceedings of the 21st Annual International Cryptology Conference, LNCS 2139. Berlin:Springer, 2001:213-229. [16] DUCAS L. Anonymity from asymmetry:new constructions for anonymous HIBE[C]//CT-RSA 2010:Proceedings of the Cryptographers' Track at the RSA Conference 2010, LNCS 5985. Berlin:Springer, 2010:148-164. [17] CHEN Z, LI S, WANG C, et al. Two constructions of multireceiver encryption supporting constant keys, short ciphertexts, and identity privacy[J]. International Journal of Network Security, 2012, 14(5):270-279. [18] AKINYELE J A, GARMAN C, MIERS I, et al. Charm:a framework for rapidly prototyping cryptosystems[J]. Journal of Cryptographic Engineering, 2013, 3(2):111-128. |