2011 Proceedings IEEE INFOCOM 2011
DOI: 10.1109/infcom.2011.5934958
|View full text |Cite
|
Sign up to set email alerts
|

Secure friend discovery in mobile social networks

Abstract: Abstract-Mobile social networks extend social networks in the cyberspace into the real world by allowing mobile users to discover and interact with existing and potential friends who happen to be in their physical vicinity. Despite their promise to enable many exciting applications, serious security and privacy concerns have hindered wide adoption of these networks. To address these concerns, in this paper we develop novel techniques and protocols to compute social proximity between two users to discover poten… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
92
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 135 publications
(92 citation statements)
references
References 27 publications
0
92
0
Order By: Relevance
“…OSN service providers should help to find trustable friends. Dong et al (2011) provide a method of finding secure friends by letting users utilize virtual IDs and digital signatures for authentication, applying proximity prefiltering by eliminating profiles that are less likely to be friends and enhancing this scheme with homomorphic cryptography to validate social coordinates and proximity results.…”
Section: Handling Fake Relationshipsmentioning
confidence: 99%
“…OSN service providers should help to find trustable friends. Dong et al (2011) provide a method of finding secure friends by letting users utilize virtual IDs and digital signatures for authentication, applying proximity prefiltering by eliminating profiles that are less likely to be friends and enhancing this scheme with homomorphic cryptography to validate social coordinates and proximity results.…”
Section: Handling Fake Relationshipsmentioning
confidence: 99%
“…Each dot product result gives one linear constraint on v k . In a traditional way as stated in [2], an adversary needs M linearly independent constraints to reconstruct the victim's private vector v k . Indeed, v k is usually K-sparse (it has at most K non-zeros) and K ≪ M .…”
Section: ) Compressive Sensing Based Privacy Reconstructionmentioning
confidence: 99%
“…Encrypted private values are input, and a series of computation are conducted homomorphically on these encrypted values to generate the encryption of the computation result on these values. A few methods like [2] propose to use a signature of encrypted input from a trusted third party P T to ensure the authenticity and consistency of the input value. However, we find that if the trusted third party P T directly signs the encrypted value E i (v i ) and the digital signature generation system are homomorphic, the party P i is able to generate a fake signature for value k · v i or v k i without contacting P T .…”
Section: ) Compressive Sensing Based Privacy Reconstructionmentioning
confidence: 99%
See 2 more Smart Citations