2014
DOI: 10.1007/978-3-319-14717-8_24
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Efficient Privacy-Preserving Attribute Matchmaking Protocol in Proximity-Based Mobile Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 27 publications
0
6
0
Order By: Relevance
“…Second, a fully trusted third party in the real sense does not exist, and there is a risk that TTP illegally accesses or leaks the user's private data because of the commercial interest drive or other reasons. [20][21][22] Third, all user attribute information matching calculations are performed on TTP, which may result in performance bottlenecks. Even in the extreme case, if there are too many users requesting at the same time, it can cause the system to crash.…”
Section: B Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Second, a fully trusted third party in the real sense does not exist, and there is a risk that TTP illegally accesses or leaks the user's private data because of the commercial interest drive or other reasons. [20][21][22] Third, all user attribute information matching calculations are performed on TTP, which may result in performance bottlenecks. Even in the extreme case, if there are too many users requesting at the same time, it can cause the system to crash.…”
Section: B Related Workmentioning
confidence: 99%
“…Although this method makes the smart terminal reduce the computing power to a certain extent, which improves the matching efficiency of users, there are some risks: First, unless the TTP is breached by attackers, the attackers can get all the users' information easily, thus leading to user information leakage. Second, a fully trusted third party in the real sense does not exist, and there is a risk that TTP illegally accesses or leaks the user's private data because of the commercial interest drive or other reasons 20‐22 . Third, all user attribute information matching calculations are performed on TTP, which may result in performance bottlenecks.…”
Section: Introductionmentioning
confidence: 99%
“…This mechanism can provide efficient matchmaking services with relatively high scalability. In [12,17,19,26,36], are the protocols based on hybrid mechanisms designed to support privacy preserving attributes matchmaking functions for MSN.…”
Section: Mobile Social Networking Applicationsmentioning
confidence: 99%
“…Privacy-preserving scalar computation of ab was used in [36] to find the number of common attributes two persons have before they are match-paired. In this protocol, the TA has n number of attributes and each person in the protocol forms a binary vector of …”
Section: Mobile Social Networking Applicationsmentioning
confidence: 99%
See 1 more Smart Citation