Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Privacy preserving attribute matching method based on CP-ABE in social networks
CUI Weirong, DU Chenglie
Journal of Computer Applications    2018, 38 (4): 1051-1057.   DOI: 10.11772/j.issn.1001-9081.2017102407
Abstract835)      PDF (1182KB)(421)       Save
Aiming at privacy protection of user attribute matching in social networks, a privacy preserving user attribute matching method was proposed based on anonymous attribute-based encryption, which can be applied to centralized attribute matching scenarios. In this method, two attribute lists were used by each user to descript his own profile and the dating preference. Then, these two lists were encoded into attribute secret key and ciphertext access control strategy respectively for the purpose of privacy protection. Finally, the server made a matching decision by judging whether the ciphertext which implies the dating preference could be decrypted correctly by the secret key which implies the user profile. In this way, the server can achieve bidirectional attribute matching without knowing the specific attribute information of both sides. According to the analysis and experimental results, the proposed method has strong practicability because it can provide high computational efficiency while ensuring privacy security.
Reference | Related Articles | Metrics
Fast proximity testing method with privacy preserving in mobile social network
CUI Weirong, DU Chenglie
Journal of Computer Applications    2017, 37 (6): 1657-1662.   DOI: 10.11772/j.issn.1001-9081.2017.06.1657
Abstract477)      PDF (948KB)(587)       Save
Concerning the problem of protecting user's location privacy in proximity testing, a new method of achieving fast proximity testing with privacy preserving was proposed. The map was divided with the grid by the proposed method. In the process of proximity testing, firstly, the vicinity region of the user was transformed into a collection of the surrounding grids. Then, the intersection of the users' vicinity regions was calculated by using the Private Set Intersection (PSI) for privacy preserving. Finally, the proximity determination was made based on whether the intersection was empty. The results of analysis and experiment show that, compared with the existing methods based on private equality testing and the method based on coordinate transformation, the proposed method can solve the fairness issue of privacy preserving in proximity testing, resist the collusion attack between the server and the user, and has a higher computational efficiency.
Reference | Related Articles | Metrics