Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer & Digital Engineering》 2015-10
Add to Favorite Get Latest Update

Privacy Protected User Proximity Computing Protocol in Mobile Social Networks

LI Fengyun;LI Jinshuang;XUE Lifang;SUN Xinran;Computing Center,Northeastern University;  
During the process of friend recommendations,in order to provide better service,it usually needs to compute the similarity value of two users.In order to avoid the leakage of user's privacy information during the process of calculating user's similarity,a three party dot product calculating protocol which is based on Paillier encryption algorithm is set up.The dot product value of the private attribute vectors is used to manifest the similarity of the two users.The privacy vectors of two users will be encrypted before calculating the dot product value,and then,estimating whether the dot product value meets the threshold requirement which is set by the system or the user.In the process,the proposed protocol can ensure the user's privacy information and the dot product values will not be leaked to any party.Performance analysis and experimental results show that the protocol has high security and efficiency.
【Fund】: 教育部基本科研业务费(编号:N130316001 N110216001);; 国家自然科学基金(编号:N61173027)资助
【CateGory Index】: TP309
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved