2021
DOI: 10.1109/jiot.2020.3028417
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Verifiable Graph Intersection Scheme With Cryptographic Accumulators in Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…The investigation also uses optimized truncation to secure a selected part of bitstreams. The work by Zuo et al [21] used homomorphic encryption to secure the graph operation in social networks associated with untrusted clouds. This investigation model offers effective data security and retains better privacy preservation.…”
Section: A Encryption-based Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…The investigation also uses optimized truncation to secure a selected part of bitstreams. The work by Zuo et al [21] used homomorphic encryption to secure the graph operation in social networks associated with untrusted clouds. This investigation model offers effective data security and retains better privacy preservation.…”
Section: A Encryption-based Approachesmentioning
confidence: 99%
“… The amount of research on protecting privacy on social networks is relatively higher. The scope of this outcome is that existing privacy preservation is carried out considering a set of adversaries that it can successfully resist [14], [16], [21]- [31], [39], [49]. Therefore, such a privacy preservation scheme is robust to act against specific attacks; however, the prime shortcoming is that there is a need to address dynamic attackers in the social network that are few to be reported.…”
Section: Research Trendsmentioning
confidence: 99%
“…However, owing to privacy concerns, many users are unwilling to provide their personal information to build social networks. To alleviate the privacy concern of users, many privacy-preserving methods have been developed to prevent the attacker from recognizing a specific user from a social network, such as disturbing the edges in social networks, restricting queries in social networks, and so on [3][4][5][6][7].…”
Section: Introductionmentioning
confidence: 99%
“…In addition, private graph intersection operation also plays an important role in social networks. Zuo et al [8] proposed an efficient and privacy-preserving verifiable graph intersection scheme using cryptographic accumulators in social networks.…”
Section: Introductionmentioning
confidence: 99%