2017
DOI: 10.1002/cpe.4238
|View full text |Cite
|
Sign up to set email alerts
|

Verifiable mobile online social network privacy‐preserving location sharing scheme

Abstract: Summary With the dramatic growth of smart phones and social network services, location‐based service has become increasingly popular in our daily life, which also brings great privacy leakage about user's location information. Thus, privacy‐preserving location sharing is still a significant problem. In this paper, two models of our scheme are verifiable, supporting location query on homomorphic encrypted ciphertext with searching index and trapdoor. The characteristics of our scheme are that it (1) allows user… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
6
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 23 publications
0
6
0
Order By: Relevance
“…Meanwhile, due to OPE, the server can directly perform range queries without decrypting the ciphertext, which minimizes the overhead on it. Compared with the homomorphic encryption-(HE-) based method [13] and AES&RSA-based method [11,22], we can state that our ULSS is more efficient and practical. From the aspect of security, in some existing solution, the privacy of users is guaranteed based on the assumption of fully trust in the service provider or TTP.…”
Section: Comparison With Other Approaches and Discussionmentioning
confidence: 98%
See 2 more Smart Citations
“…Meanwhile, due to OPE, the server can directly perform range queries without decrypting the ciphertext, which minimizes the overhead on it. Compared with the homomorphic encryption-(HE-) based method [13] and AES&RSA-based method [11,22], we can state that our ULSS is more efficient and practical. From the aspect of security, in some existing solution, the privacy of users is guaranteed based on the assumption of fully trust in the service provider or TTP.…”
Section: Comparison With Other Approaches and Discussionmentioning
confidence: 98%
“…We compared our proposed scheme with other similar approaches for a holistic evaluation of our system. Table 3 shows the results in terms of TTP, server, cryptography method, and efficiency characteristics when comparing with approaches like MLS in 2017 [11], VPPLS in 2017 [13], and UDPLS in 2017 [22].…”
Section: Comparison With Other Approaches and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In traditional (t, n) secret sharing scheme, each of the n participants keep a share of secret s in such a way that any t or more participants can reconstruct the secret s; less than t participants cannot get any information on s. Secret sharing scheme is a useful fundamental to other cryptographic protocols [3,4]. Due to the low efficiency in secret reconstruction of traditional (t, n) secret sharing scheme (shares are used to reconstruct only one secret), multiple secret sharing becomes more popular in recent years [5][6][7] which can improve the use efficiency of the shares.…”
Section: Introductionmentioning
confidence: 99%
“…Bai analyzes the characteristics and meaning of intelligent manufacturing systems, which leads to problems facing the Intelligent Manufacturing System and then dispersing the benefits of SDN. Two models of the scheme are verifiable by Tang and Cai, supporting location query on homomorphic encrypted ciphertext with searching index and trapdoor. Yang et al aim to present a method to make calibration procedure intelligent and automatic by machine.…”
mentioning
confidence: 99%