| [1] LIANG X, ZHANG K, SHEN X, et al. Security and privacy in mobile social networks:challenges and solutions[J]. IEEE Wireless Communications, 2014, 21(1):33-41. [2] HU C, LI R, LI W, et al. Efficient privacy-preserving schemes for dot-product computation in mobile computing[C]//PAMCO 2016:Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing. New York:ACM, 2016:51-59.
 [3] SHENG G, WEN T, GUO Q, et al. Privacy preserving inner product of vectors in cloud computing[J]. International Journal of Distributed Sensor Networks, 2014, 10(5):537252.
 [4] ZHANG R, ZHANG J, ZHANG Y, et al. Privacy-preserving profile matching for proximity-based mobile social networking[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9):656-668.
 [5] LI M, YU S, CAO N, et al. Privacy-preserving distributed profile matching in proximity-based mobile social networks[J]. IEEE Transactions on Wireless Communications, 2013, 12(5):2024-2033.
 [6] ISHIKURO Y, OMOTE K. Privacy-preserving profile matching protocol considering conditions[C]//Proceedings of the 10th International Conference on Network and System Security, LNSC 9955. Berlin:Springer, 2016:171-183.
 [7] HE D, CAO Z, DONG X, et al. User self-controllable profile matching for privacy-preserving mobile social networks[C]//Proceedings of the 2014 IEEE International Conference on Communication Systems. Piscataway, NJ:IEEE, 2014:248-252.
 [8] XIE K, WANG X, LI W, et al. Bloom-filter-based profile matching for proximity-based mobile social networking[C]//Proceedings of the 13th Annual IEEE International Conference on Sensing, Communication, and Networking. Piscataway, NJ:IEEE, 2016:1-9.
 [9] SAHAI A, WATERS B. Fuzzy identity-based encryption[C]//EUROCRYPT 2005:Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 3494. Berlin:Springer, 2005:457-473.
 [10] GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security. New York:ACM, 2006:89-98.
 [11] NISHIDE T, YONEYAMA K, OHTA K. Attribute-based encryption with partially hidden encryptor-specified access structures[C]//ACNS 2008:Proceedings of the 6th International Conference on Applied Cryptography and Network Security, LNCS 5037. Berlin:Springer, 2008:111-129.
 [12] ZHANG Y, CHEN X, LI J, et al. Anonymous attribute-based encryption supporting efficient decryption test[C]//Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. New York:ACM, 2013:511-516.
 [13] JUNG T, LI X Y, WAN Z, et al. Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(1):190-199.
 [14] 解理, 任艳丽. 隐藏访问结构的高效基于属性加密方案[J]. 西安电子科技大学学报(自然科学版), 2015, 42(3):97-102.(XIE L, REN Y L. Efficient attribute-based encryption with hidden access structures[J]. Journal of Xidian University, 2015, 42(3):97-102.)
 [15] BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[C]//CRYPTO 2001:Proceedings of the 21st Annual International Cryptology Conference, LNCS 2139. Berlin:Springer, 2001:213-229.
 [16] DUCAS L. Anonymity from asymmetry:new constructions for anonymous HIBE[C]//CT-RSA 2010:Proceedings of the Cryptographers' Track at the RSA Conference 2010, LNCS 5985. Berlin:Springer, 2010:148-164.
 [17] CHEN Z, LI S, WANG C, et al. Two constructions of multireceiver encryption supporting constant keys, short ciphertexts, and identity privacy[J]. International Journal of Network Security, 2012, 14(5):270-279.
 [18] AKINYELE J A, GARMAN C, MIERS I, et al. Charm:a framework for rapidly prototyping cryptosystems[J]. Journal of Cryptographic Engineering, 2013, 3(2):111-128.
 |