CN111526155B - System for protecting user privacy in social network and optimal path matching method - Google Patents

System for protecting user privacy in social network and optimal path matching method Download PDF

Info

Publication number
CN111526155B
CN111526155B CN202010363822.1A CN202010363822A CN111526155B CN 111526155 B CN111526155 B CN 111526155B CN 202010363822 A CN202010363822 A CN 202010363822A CN 111526155 B CN111526155 B CN 111526155B
Authority
CN
China
Prior art keywords
user
server
vertex
information
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010363822.1A
Other languages
Chinese (zh)
Other versions
CN111526155A (en
Inventor
张明武
陈誉
丁勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guilin University of Electronic Technology
Original Assignee
Guilin University of Electronic Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guilin University of Electronic Technology filed Critical Guilin University of Electronic Technology
Priority to CN202010363822.1A priority Critical patent/CN111526155B/en
Publication of CN111526155A publication Critical patent/CN111526155A/en
Application granted granted Critical
Publication of CN111526155B publication Critical patent/CN111526155B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Bioethics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Data Mining & Analysis (AREA)
  • Primary Health Care (AREA)
  • Marketing (AREA)
  • Medical Informatics (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention relates to a system for protecting user privacy in a social network and an optimal path matching method. The method comprises the following steps: the trusted center generates system parameters and a secret key and sends the system parameters to the server and the user; the user registers; the server registers; a user constructs vertex information and weight information and sends ciphertext information generated in the process of constructing the vertex information and the weight information to a server; the server is used for constructing a social graph according to the vertex information and the weight information; a query user in the users uploads a starting terminal mark to a server; the server generates a path sequence and a weight sequence according to the social graph and the starting and ending point identification; the server sends the weight sequence to the inquiry user so that the inquiry user can determine the position of the ciphertext; and the inquiry user determines the optimal path from the path sequence by adopting an inadvertent transmission mode according to the ciphertext position. The method and the device can ensure that the privacy of the user is not revealed during path query, and have the advantages of high query speed, accurate and efficient processing.

Description

System for protecting user privacy in social network and optimal path matching method
Technical Field
The invention relates to the technical field of social networks, in particular to a system for protecting user privacy in a social network and an optimal path matching method.
Background
In order to realize various intelligent services, such as recommendation service, sharing service, and query service, the online social network needs to perform information association query and matching by using personal attribute information of a user to obtain optimal recommendations in the social network. However, the user attribute information includes personal privacy of many users, such as sensitive information of user age, gender, work units, place of residence, and the like. Malicious attackers can obtain, analyze and use the data for illegal operations by means of snooping and the like. Therefore, how to protect the privacy of users in social networks is an important issue.
In the social network, all users upload their private information to a cloud server. The user provides the source point information and the end point information, so that the propagation path between the two coordinates can be inquired, wherein the optimal propagation path represents that the propagation cost of the user is smaller and the propagation is more effective. Through the optimal propagation path, the user can rapidly and efficiently propagate a certain message to the target user. In order to protect privacy, user information is usually uploaded after being encrypted, and propagation cost (defined as weight value) between users needs to be compared in an outsourcing environment. The whole process should ensure that the server cannot know the sensitive data of the user and the system user can not obtain any information except for the propagation path. Some methods for solving the above problems, such as a path query method based on a homomorphic encryption algorithm, also appear; the homomorphism property enables the ciphertext obtained by encrypting to be subjected to certain operation to be equal to the ciphertext obtained by performing another operation on the encrypted plaintext. However, in the existing path query scheme, firstly, the definition of weight information between vertexes is not accurate enough, the interaction between the vertexes is not considered, and the purpose of path query cannot be clearly expressed; secondly, the query speed is positively correlated with the number of vertexes, so that the practicability of query of a large social network cannot be ensured or the balance between accuracy and efficiency needs to be made.
Disclosure of Invention
The invention aims to provide a system for protecting user privacy in a social network and an optimal path matching method, which can ensure that propagation paths of any two vertexes of a large-scale social network can be quickly inquired, the inquiry speed does not depend on the number of users, and the privacy protection safety is improved.
In order to achieve the purpose, the invention provides the following scheme:
a system for protecting user privacy in a social network, comprising: the system comprises a trusted center, a server and a user, wherein the trusted center is used for generating system parameters and a secret key and sending the parameters to the server; the method comprises the steps that after the user registers, vertex information and weight information are constructed, ciphertext information generated in the process of constructing the vertex information and the weight information is sent to a server, the server is used for constructing a social graph according to the vertex information and the weight information after registering, a query user in the user is used for providing identification marks of the user and a target user, the server is used for querying all propagation paths and corresponding weights, and an optimal path is provided for the query user through an inadvertent transmission mode.
An optimal path matching method for protecting user privacy in a social network comprises the following steps:
the trusted center generates system parameters and a secret key and sends the system parameters to the server and the user;
the user registers;
the server registers;
the user constructs vertex information and weight information and sends ciphertext information generated in the process of constructing the vertex information and the weight information to the server;
the server is used for constructing a social graph according to the vertex information and the weight information;
a query user in the users uploads a starting end point identifier to the server;
the server generates a path sequence and a weight sequence according to the social graph and the starting and ending point identification;
the server sends the weight value sequence to the inquiry user so that the inquiry user can determine the ciphertext position;
and the inquiry user determines an optimal path from the path sequence by adopting an inadvertent transmission mode according to the ciphertext position.
Optionally, the trusted center generates system parameters and a secret key, and sends the system parameters to the server and the user, which specifically includes:
acquiring a safety parameter kappa;
calculating a master public key mpk and a master key msk of the encryption algorithm according to the security parameters, wherein mpk is (g) msk ,g,p),
Figure GDA0003735155990000021
p is a large prime number and satisfies | p | ═ k,
Figure GDA0003735155990000022
is [1, p-1 ]]In an arbitrary integer, g is
Figure GDA0003735155990000023
A generator of (2); selecting a random number R, wherein | R | < | p |/3;
obtaining a key pair (sk) 1 ,sk 2 ) The key pair includes a first key sk 1 And a second key sk 2 Wherein, in the step (A),
Figure GDA0003735155990000031
sk 1 +sk 2 =mskmod(p-1);
randomly acquiring n user key vectors
Figure GDA0003735155990000032
Wherein the content of the first and second substances,
Figure GDA0003735155990000033
and issuing parameter information, wherein the parameter information comprises the master public key, the generator, the prime number and the random number.
Optionally, the registering of the user specifically includes:
sending a first registration request;
the trusted center follows the integer sequence according to the first registration requestRandomly selecting an integer as the ID of the current user i And combining the key vector
Figure GDA0003735155990000037
Returning to the current user;
sending the identification ID to all users connected with the current user i
The inquiring user obtains the ID i Then sending a second registration request;
the trusted center returns the first key sk to the inquiring user according to the second registration request 1
Optionally, the registering by the server specifically includes:
sending a third registration request;
the trusted center returns the second key sk to the server according to the third registration request 2
Optionally, the user constructs vertex information and weight information, and sends ciphertext information generated in the process of constructing the vertex information and the weight information to the server, and the method specifically includes:
obtaining the USER i Attribute information of (2);
binarizing the attribute information through one-hot coding to enable the value of only one bit in a binary value corresponding to each dimension attribute to be 1; the current USER USER i Capable of converting all discrete attributes of an individual into an attribute vector of length l
Figure GDA0003735155990000034
The USER USER i According to the key vector
Figure GDA0003735155990000035
Encrypting the attribute vector
Figure GDA0003735155990000036
Obtaining social network informationVertex information v in (1) i
USER for each connected USER j The current USER USER i Sending an application to the trusted center;
the trusted center returns a weight key according to the application;
calculating a weight ciphertext by using the encryption homomorphism property and the weight key, and sending the weight ciphertext to a server;
and the server integrates the ciphertext to obtain weight information.
Optionally, the server generates a path sequence and a weight sequence according to the social graph and the start and end point identifier, and specifically includes:
determining a vertex v corresponding to a starting point identifier in the social graph s And is defined as a first layer set of starting vertices S 1 (ii) a Finding the vertex v corresponding to the terminal point identification t And defined as a first layer termination vertex set T 1
Determining the first layer starting vertex set S 1 And the first layer termination vertex set T 1 Is denoted by v u Wherein v is u ∈{S 1 ∩T 1 Querying a vertex v according to the social graph s And v u And v u And v t The weights between them are respectively marked as E s,u And E u,t D, E is to s,u ·E u,t Added to the weight sequence
Figure GDA0003735155990000041
In, query vertex v simultaneously u Corresponding identity ID u Will ID u Join to Path sequence
Figure GDA0003735155990000042
Performing the following steps;
determining the first set of starting vertices S from the social graph 1 Each vertex v of i All connected vertices v of j And is defined as the second layer initial vertex set S 2 At the same time v i →v j Adding to a set of prepositioned vertices P 1
Determining the second layer starting vertex set S 2 And the first layer termination vertex set T 1 Is updated by v u Wherein v is u ∈{S 2 ∩T 1 At the same time in the set of front vertices P 1 In finding v u And is denoted by v i Sequentially querying vertexes v according to the social graph s And v i 、v i And v u And v u And v t The weights between are respectively marked as E s,i 、E i,u And E u,t A 1 is mixing E s,i ·E i,u ·E u,t Added to the weight sequence
Figure GDA0003735155990000043
In, query vertex v simultaneously i And v u Corresponding identity ID i And ID u Will ID i ·R+ID u Join to Path sequences
Figure GDA0003735155990000044
Performing the following steps;
determining the first set of termination vertices T from the social graph 1 Each vertex v of i′ All connected vertices v of j′ And is defined as a second layer termination vertex set T 2 While v is being measured i′ →v j′ Adding to the post-vertex set P 2
Determining the second layer starting vertex set S 2 And the second layer termination vertex set T 2 Is updated by v u Wherein v is u ∈{S 2 ∩T 2 At the same time in the set of front vertices P 1 In finding v u And is denoted by v i At said set of post-vertices P 2 In finding v u Is denoted by v i′ Sequentially querying vertexes v according to the social graph s And v i 、v i And v u 、v u And v i′ And v i′ And v u The weights between are respectively marked as E s,i 、E i,u 、E u,i′ And E i′,t A 1 is mixing E s,i ·E i,u ·E u,i′ ·E i′,t Is added to
Figure GDA0003735155990000045
In, query vertex v simultaneously i 、v i′ And v u Corresponding identity ID i 、ID i′ And ID u Will ID i ·R 2 +ID u ·R+ID i′ Is added to
Figure GDA0003735155990000046
In (3), get the path sequence
Figure GDA0003735155990000047
Sum weight sequence
Figure GDA0003735155990000048
Optionally, the sending, by the server, the weight sequence to the querying user so that the querying user determines a ciphertext position includes:
according to the second key sk 2 Decrypting the sequence of weights
Figure GDA0003735155990000051
Each element of (a) obtains a first sequence of decryption weights
Figure GDA0003735155990000052
And sending the information to the inquiry user;
the inquiring user is according to the first key sk 1 Decrypting the first weight sequence
Figure GDA0003735155990000053
Each element of (2) to obtain a second decryption weight sequence
Figure GDA0003735155990000054
According to the second decryption weight sequence
Figure GDA0003735155990000055
And obtaining the ciphertext position.
Optionally, the determining, by the querying user, an optimal path from the path sequence according to the ciphertext position in an oblivious transmission manner specifically includes:
the server sends q random integers C to the inquiring user h
Figure GDA0003735155990000056
Wherein q is a sequence of paths
Figure GDA0003735155990000057
The number of the elements in the Chinese character,
Figure GDA0003735155990000058
the querying user generates a key
Figure GDA0003735155990000059
Calculating q public keys and sending each public key to the server, wherein the public key corresponding to the ciphertext position is generated by a secret key k, and the rest public keys are generated according to the public key and the integer C h Generating;
the server checks each public key to obtain a check result;
the server encrypts a path sequence by using the public key according to the check result and sends the path sequence to the inquiry user;
and the inquiry user decrypts the path ciphertext corresponding to the ciphertext position in the path sequence according to the key k, and can determine the optimal path of the social network by an accidental transmission mode.
According to the specific embodiment provided by the invention, the invention discloses the following technical effects:
(1) the invention has high security, and all processes are realized by using an ElGamal encryption system. Even if the server has complete graph information such as vertex information and weight information, the server and external attackers cannot obtain any private information as long as there is no collusion between the user and the server. Meanwhile, the user cannot recover the user key of the connected user from the weight key obtained by the vector inner product. Therefore, the invention has high privacy protection safety.
(2) By means of an inadvertent transmission mode, due to the fact that discrete logarithm is difficult to assume, the server does not know the specific content of the path which the user wants to query, namely the specific position of the ciphertext b cannot be judged; because the server verifies the correctness of the public key in transmission, the user can only obtain a path, namely, the key required by other ciphertexts can not be forged or judged except k.
(3) The invention provides an optimal path matching method for protecting user privacy in a social network, which is characterized in that on the premise of ensuring the security, by using a data structure of bidirectional breadth-first search of a source point and a destination point, the operation speed of a server is high, the processing is efficient, and parameters in the process can be pre-generated so as to reduce the actual operation time.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings required in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a schematic diagram illustrating a system for protecting user privacy in a social network according to the present invention;
FIG. 2 is a schematic diagram of internal data transmission of the system for protecting user privacy in the social network according to the present invention;
FIG. 3 is a flowchart of an optimal path matching method for protecting user privacy in a social network according to the present invention;
FIG. 4 is a flowchart of entity registration in a method according to an embodiment of the invention;
fig. 5 is a flow chart of an inadvertent transmission in a method according to an embodiment of the invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention aims to provide a system for protecting user privacy in a social network and an optimal path matching method, which can ensure that propagation paths of any two vertexes of a large social network can be quickly inquired, the inquiry speed does not depend on the number of users, and the privacy protection safety is improved.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
FIG. 1 is a diagram illustrating a system for protecting privacy of users in a social network according to the present invention. As shown in fig. 1, a system for protecting user privacy in a social network includes: trusted center 1, server 2, user 3. FIG. 2 is a schematic diagram of data transmission inside the system for protecting user privacy in the social network according to the present invention. As shown in fig. 2, the system includes a trusted center (TA), a server (CS) and a USER (USER). The trusted center 1 is used for generating system parameters and keys and sending the parameters to the server 2; the user 3 constructs vertex information and weight information after registration, ciphertext information generated in the process of constructing the vertex information and the weight information is sent to the server 2, the server 2 is used for constructing a social graph after registration according to the vertex information and the weight information, a query user in the user 3 is used for providing identification marks of the user and a target user, the server 2 is used for querying all propagation paths and corresponding weights, and an optimal path is provided for the query user through an inadvertent transmission mode. Suppose there are n USERs USER in the system i (i ═ 1,2, …, n). The trusted center 1 distributes and calculates system parameters: ID of user 3, user passwordKey with a key body
Figure GDA0003735155990000071
Weight key f, query key (sk) 1 ,sk 2 ),USER i Uploading personal sensitive information to a server 2 through encryption, constructing a social graph G (V, E) composed of ciphertext through calculation and integration by the server 2, and providing Identification (ID) of a user and an Identity (ID) of a target user by a query user RU in a user 3 s ,ID t ) The server 2 inquires out all the propagation paths
Figure GDA0003735155990000072
And corresponding weight value
Figure GDA0003735155990000073
Inquiring the user decryption weight sequence to obtain the subscript of the optimal propagation path, and transmitting OT through many-to-one carelessness 1 q In this way, the query user can obtain the optimal propagation path.
FIG. 3 is a flowchart of an optimal path matching method for protecting user privacy in a social network according to the present invention. As shown in fig. 3, an optimal path matching method for protecting user privacy in a social network includes:
step 101: the method comprises the following steps that the trusted center generates system parameters and a secret key and sends the system parameters to a server and a user, and specifically comprises the following steps:
and acquiring a safety parameter kappa.
According to the security parameters, calculating a master public key mpk and a master key msk of the encryption algorithm, wherein mpk is (g) msk ,g,p),
Figure GDA0003735155990000074
p is a large prime number and satisfies | p | ═ k,
Figure GDA0003735155990000075
represents [1, p-1 ]]In an arbitrary integer, g is
Figure GDA0003735155990000076
A generator of (2), selecting a random number R,where R < p/3.
Obtaining a key pair (sk) 1 ,sk 2 ) The key pair includes a first key sk 1 And a second key sk 2 Wherein, in the step (A),
Figure GDA0003735155990000077
sk 1 +sk 2 =mskmod(p-1)。
randomly obtaining n user key vectors
Figure GDA0003735155990000078
Wherein, the first and the second end of the pipe are connected with each other,
Figure GDA0003735155990000079
publishing parameters (mpk, g, p, R), i.e. public key for encryption, generator element, prime modulus information and system nonce information for the integration path.
Step 102: the registering of the user specifically includes:
a first registration request is sent.
The trusted center randomly selects an integer from the integer sequence as the identity ID of the current user according to the first registration request i And combining the key vector
Figure GDA0003735155990000081
And returning to the current user.
Sending the ID to all users connected with the current user i
The inquiring user obtains the ID i And then sends a second registration request.
The trusted center returns the first key sk to the inquiring user according to the second registration request 1
Step 103: the server performs registration, specifically including:
a third registration request is sent.
The trusted center returns the information to the server according to the third registration requestThe second key sk 2
Step 104: the user constructs vertex information and weight information, and sends ciphertext information generated in the process of constructing the vertex information and the weight information to the server, and the method specifically comprises the following steps:
obtaining the USER i The attribute information of (2).
Binarizing the attribute information through one-hot coding to enable the value of only one bit in a binary value corresponding to each dimension attribute to be 1; the current USER USER i Capable of converting all discrete attributes of an individual into an attribute vector of length l
Figure GDA0003735155990000082
The USER USER i According to the key vector
Figure GDA0003735155990000083
Encrypting the attribute vector
Figure GDA0003735155990000084
Deriving vertex information v in a social network i (ii) a Wherein:
Figure GDA0003735155990000085
USER for each connected USER j The current USER USER i And sending an application to the trusted center.
The trusted center returns a weight key according to the application, specifically
Figure GDA0003735155990000086
Calculating a weight ciphertext by using the encryption homomorphism property and the weight key, and sending the weight ciphertext to a server; wherein the weight value ciphertext
Figure GDA0003735155990000087
Calculated using the formula:
Figure GDA0003735155990000091
wherein rank i,j Is USER i And USER j A predefined integer affinity value between.
And the server integrates the ciphertext to obtain weight information. The specific weight information is:
Figure GDA0003735155990000092
wherein the weight e i,j Is defined as follows:
Figure GDA0003735155990000093
step 105: the server is used for constructing a social graph according to the vertex information and the weight information; constructing a social graph G (V, E) according to the vertex information and the weight information, wherein: v ═ V i |i∈[1,n]},E={E i,j |i,j∈[1,n],USER i And USER j With a connection }.
Step 106: and the inquiry user in the users uploads the starting end point identification to the server.
Step 107: the server generates a path sequence and a weight sequence according to the social graph and the start and end point identifier, and specifically includes:
determining a vertex v corresponding to a starting point identifier in the social graph s And is defined as a first layer set of starting vertices S 1 (ii) a Finding the vertex v corresponding to the terminal point identification t And is defined as a first layer termination vertex set T 1
Determining the first layer starting vertex set S 1 And the first layer termination vertex set T 1 Is denoted as v u Wherein v is u ∈{S 1 ∩T 1 Querying a vertex v according to the social graph s And v u And v u And v t The weights between them are respectively marked as E s,u And E u,t A 1 is mixing E s,u ·E u,t Added to the weight sequence
Figure GDA0003735155990000094
In, query vertex v simultaneously u Corresponding identification ID u Will ID u Join to Path sequences
Figure GDA0003735155990000095
In (1).
Determining the first set of starting vertices S from the social graph 1 Each vertex v of i All connected vertices v of j And is defined as a second layer initial vertex set S 2 At the same time v i →v j Adding to a set of prepositioned vertices P 1
Determining the second layer starting vertex set S 2 And the first layer termination vertex set T 1 Is updated as v u Wherein v is u ∈{S 2 ∩T 1 At the same time in the set of leading vertices P 1 In finding v u And is denoted by v i Sequentially querying vertexes v according to the social graph s And v i 、v i And v u And v u And v t The weights between are respectively marked as E s,i 、E i,u And E u,t A 1 is mixing E s,i ·E i,u ·E u,t Added to the weight sequence
Figure GDA0003735155990000096
In, query vertex v simultaneously i And v u Corresponding identity ID i And ID u Will ID i ·R+ID u Join to Path sequence
Figure GDA0003735155990000097
In (1).
Determining the first-tier set of termination vertices T from the social graph 1 Each vertex v of i′ All connected vertices v of j′ And is defined as a second layer termination vertex set T 2 At the same timeV is to be i′ →v j′ Adding to the post-vertex set P 2
Determining the second layer starting vertex set S 2 And the second layer termination vertex set T 2 Is updated as v u Wherein v is u ∈{S 2 ∩T 2 At the same time in the set of leading vertices P 1 In finding v u And is denoted by v i At said set of post-vertices P 2 In finding v u Is denoted by v i′ Sequentially querying vertexes v according to the social graph s And v i 、v i And v u 、v u And v i′ And v i′ And v u The weights between are respectively marked as E s,i 、E i,u 、E u,i′ And E i′,t D, E is to s,i ·E i,u ·E u,i′ ·E i′,t Is added to
Figure GDA0003735155990000101
In, query vertex v simultaneously i 、v i′ And v u Corresponding identity ID i 、ID i′ And ID u Will ID i ·R 2 +ID u ·R+ID i′ Is added to
Figure GDA0003735155990000102
In (1), get the path sequence
Figure GDA0003735155990000103
Sum weight sequence
Figure GDA0003735155990000104
Step 108: the server sends the weight sequence to the querying user so that the querying user determines the ciphertext position, and the method specifically includes:
according to the second key sk 2 Decrypting the weight sequence
Figure GDA0003735155990000105
Each element of (a) obtains a first sequence of decryption weights
Figure GDA0003735155990000106
And sending the information to the inquiring user.
The inquiring user is according to the first key sk 1 Decrypting the first weight sequence
Figure GDA0003735155990000107
Each element of (2) to obtain a second decryption weight sequence
Figure GDA0003735155990000108
According to the second decryption weight value sequence
Figure GDA0003735155990000109
And obtaining the ciphertext position.
Using the second key sk 2 Decipher the weight sequence
Figure GDA00037351559900001010
Each element of (1) to obtain
Figure GDA00037351559900001011
And sending to the inquiring user:
Figure GDA00037351559900001012
first key sk for inquiring user 1 Decipher the weight sequence
Figure GDA00037351559900001013
Each element of (a):
Figure GDA00037351559900001014
i.e. w of the final decryption i "for the total weight of each path, by a sorting algorithm, e.g. bubblingAlgorithm, RU can sort out the index of the minimum value, i.e. the ciphertext position
Figure GDA00037351559900001015
Step 109: the query user determines an optimal path from the path sequence by adopting an inadvertent transmission mode according to the ciphertext position, and the method specifically comprises the following steps:
the server sends q random integers C to the inquiring user h
Figure GDA00037351559900001016
Wherein q is a sequence of paths
Figure GDA00037351559900001017
Number of elements in, i.e.
Figure GDA00037351559900001018
The inquiry user calculates q public keys and leads each public key beta 12 ,…,β q Sending the data to the server; wherein random numbers are selected
Figure GDA0003735155990000111
Computing a b-th said public key beta as a secret key b And the other public keys are calculated by the public keys of the adjacent subscripts and the random integer step by step in two directions to form a chain structure:
β i =C ii+1 modp,i=1,2,…,b-1
β b =g k modp
β j =C j-1j-1 modp,j=b+1,b+2,…,q
said server checking each of said public keys, i.e. checking C i =β i ·β i+1 modp, the inspection result is obtained.
The server encrypts a path sequence by using the public key according to the check result and sends the path sequence to the inquiry user; serviceBy beta i Encrypt m i And sending to the RU:
Figure GDA0003735155990000112
and the inquiry user decrypts the path ciphertext corresponding to the ciphertext position in the path sequence according to the key k, and can determine the optimal path of the social network through an accidental transmission mode. Namely, the inquiry user decrypts the b-th ciphertext c by using the key k b Obtaining an optimal path
Figure GDA0003735155990000113
And finally obtaining each vertex identification ID in the optimal path through iterative computation i =(m b -(m b modR))/R。
Example 1:
the invention provides an optimal path matching method for protecting user privacy in a social network, which comprises the following steps:
step 1: and generating system parameters.
Step 1.1: the trusted center (TA) selects the security parameter k and calculates the master public key (mpk ═ g) of the ElGamal encryption algorithm msk G, p) and a master key
Figure GDA0003735155990000114
Wherein p is a large prime number and satisfies | p | ═ κ, g is
Figure GDA0003735155990000115
A generator of (2). A random number R is selected, where R < p/3.
Step 1.2: TA selects a pair of keys (sk) 1 ,sk 2 ) Wherein
Figure GDA0003735155990000116
Make sk 1 +sk 2 =mskmod(p-1)。
Step 1.3: TA random selection of n user key vectors
Figure GDA0003735155990000117
Step 1.4: TA issues parameters (mpk, g, p, R).
The entity registration process relates to fig. 4.
Step 2: and (4) registering the entity.
Step 2.1: USER i (i ═ 1,2, …, n) is registered.
Step 2.1.1: USER i (i ═ 1,2, …, n) sends a registration request.
Step 2.1.2: TA randomly selects an integer from the sequence of integers {1,2, …, n } as the user's ID i And will be
Figure GDA0003735155990000121
And returning to the user.
Step 2.1.3: USER i Sending the ID of the user to all connected users i
Step 2.1.4: the querying user RU sends a registration request.
Step 2.1.5: TA Return Key sk to RU 1
Step 2.2: the server CS registers.
Step 2.2.1: the server CS sends a registration request.
Step 2.2.2: TA returns the secret key sk to CS 2
And step 3: and building a social graph.
Step 3.1: and constructing vertex information.
Step 3.1.1: USER i And (4) binarizing the attribute information of the user by one-hot coding, namely, the value of only one bit in the binary value corresponding to each dimension attribute is 1. Wherein:
sex is male: six i 10; sex is female: six i =01。
Age 0-20: age (age) i 100; age 21-50 hours: age (age) i 010; age 50 or above: age (age) i =001。
So that all discrete attributes of the user are converted into an attribute vector with each element being a binary value
Figure GDA0003735155990000122
Where l represents the length of the user's attribute vector.
Step 3.1.2: USER i By means of a secret key
Figure GDA0003735155990000123
Encryption attribute vector
Figure GDA0003735155990000124
Forming a vertex
Figure GDA0003735155990000125
Figure GDA0003735155990000126
Figure GDA0003735155990000127
Step 3.2: and constructing weight information.
Step 3.2.1: USER for each connected USER j USER i Sending application to TA
Figure GDA0003735155990000131
Step 3.2.2: TA query ID j Corresponding user key vector
Figure GDA0003735155990000132
Calculating and returning weight value key f j,i
Figure GDA0003735155990000133
Step 3.2.3: USER i Computing weight ciphertext by utilizing ElGamal homomorphism property
Figure GDA0003735155990000134
And sends it to the server CS:
Figure GDA0003735155990000135
wherein rank i,j Is the USER i And USER j A predefined integer affinity value between.
Step 3.2.4: the CS integrates the ciphertext and forms a weight as:
Figure GDA0003735155990000136
wherein the weight e i,j Is defined as:
Figure GDA0003735155990000137
this indicates that the closer the two users are, the faster the message is propagated, so that the weight between the users is smaller.
Step 3.3: from the vertices and edges, a social graph G ═ V, E can be constructed.
Wherein: v ═ V i |i∈[1,n]},E={E i,j |i,j∈[1,n],USER i And USER j With a connection }.
And 4, step 4: and (6) path query.
Step 4.1: inquiring the Identification (ID) corresponding to the starting and ending point uploaded by the RU of the user s ,ID t ) To the server CS.
Step 4.2: CS generation path sequence
Figure GDA0003735155990000138
Sum weight sequence
Figure GDA0003735155990000139
Step 4.2.1: the CS finds a starting point v in the social graph G s And is defined as a first layer set of starting vertices S 1 (ii) a Finding the end point v t All of (2)And is defined as a first layer set of termination vertices T 1 . Wherein v is not included s And v t
Step 4.2.2: CS sorting out S 1 And T 1 Common vertex v in (1) u ∈{S 1 ∩T 1 }, query vertex v s And v u And v u And v t In between, and E s,u ·E u,t Is added to
Figure GDA0003735155990000141
In (1), v is u Corresponding identity ID u Is added to
Figure GDA0003735155990000142
In (1).
Wherein:
Figure GDA0003735155990000143
the homomorphism property of the ElGamal encryption system is used to aggregate the weights of the two connected edges together.
Step 4.2.3: CS finds S in social graph G 1 Each vertex v of i All connected vertices v of j And is defined as the second layer initial vertex set S 2 At the same time v i →v j Adding to a set of prepositioned vertices P 1 (ii) a Wherein v is not included s And v t
Step 4.2.4: CS sorting out S 2 And T 1 Common vertex v in (1) u ∈{S 2 ∩T 1 At P } 1 In finding v u Is v as the leading vertex i Querying the vertex v s And v i 、v i And v u And v u And v t In between, and E s,i ·E i,u ·E u,t Is added to
Figure GDA0003735155990000144
In, query vertex v simultaneously i And v u Corresponding identityIdentification ID i And ID u Will ID i ·R+ID u Is added to
Figure GDA0003735155990000145
In (1).
Wherein:
Figure GDA0003735155990000146
step 4.2.5: CS finds T in social graph G 1 Each vertex v of i′ All connected vertices v of j′ And is defined as a second layer termination vertex set T 2 At the same time v i′ →v j′ Adding to the post-vertex set P 2 (ii) a Wherein v is not included s And v t
Step 4.2.6: CS sorting out S 2 And T 2 Common vertex v in (1) u ∈{S 2 ∩T 2 At P 1 In finding v u Is v as the leading vertex i At P 2 In finding v u Has a post-vertex of v i′ Sequentially querying vertexes v according to the social graph s And v i 、v i And v u 、v u And v i ' and v i ' and v u A weight value of E between s,i ·E i,u ·E u,i′ ·E i′,t Is added to
Figure GDA0003735155990000151
In, query vertex v simultaneously i 、v i′ And v u Corresponding identification ID i 、ID i′ And ID u Will ID i ·R 2 +ID u ·R+ID i′ Is added to
Figure GDA0003735155990000152
In (1).
Wherein:
Figure GDA0003735155990000153
step 4.3: RU picks out the index b of the optimal path in the path sequence.
Step 4.3.1: secret key sk for CS 2 Decipher weight sequence
Figure GDA0003735155990000154
Each element of (a) to obtain
Figure GDA0003735155990000155
And sending to the RU:
Figure GDA0003735155990000156
step 4.3.2: RU Key sk 1 Decipher the weight sequence
Figure GDA0003735155990000157
Each element of (a):
Figure GDA0003735155990000158
i.e. the final decrypted w ″ i For the total weight of each path, through a sorting algorithm, such as a bubble algorithm, the RU may select the subscript corresponding to the minimum value as
Figure GDA0003735155990000159
The process of inadvertent transmission relates to fig. 5.
Step 4.4: RU inadvertently acquires optimal path m b
Step 4.4.1: CS sends q random integers to RU
Figure GDA00037351559900001510
Wherein q is a sequence of paths
Figure GDA00037351559900001511
Of (1) elementTo a number of
Figure GDA00037351559900001512
Step 4.4.2: RU selecting random number
Figure GDA00037351559900001513
As a key, calculate beta 12 ,…,β q And sending to the CS:
β i =C ii+1 modp,i=1,2,…,b-1
β b =g k modp
β j =C j-1j-1 modp,j=b+1,b+2,…,q
step 4.4.3: CS examination C i =β i ·β i+1 modp。
Step 4.4.4: beta for CS i Encrypt m i And sending to the RU:
Figure GDA00037351559900001514
step 4.4.5: RU decrypts the b-th ciphertext c by using key k b Obtaining an optimal path
Figure GDA0003735155990000161
And finally obtaining each vertex identification ID in the optimal path through iterative computation i =(m b -(m b modR))/R。
The invention is based on ElGamal homomorphic encryption and inadvertent transmission OT 1 q The method realizes an optimal path matching scheme for protecting the privacy of the user in the social network, and the scheme realizes the resistance to external attack and internal attack.
In the present specification, the embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
The principle and the embodiment of the present invention are explained by applying specific examples, and the above description of the embodiments is only used to help understanding the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, the specific embodiments and the application range may be changed. In view of the above, the present disclosure should not be construed as limiting the invention.

Claims (3)

1. An optimal path matching method for protecting user privacy in a social network is characterized by comprising the following steps:
the trusted center generates system parameters and a secret key and sends the system parameters to the server and the user;
the user registers;
the server registers;
the user constructs vertex information and weight information and sends ciphertext information generated in the process of constructing the vertex information and the weight information to the server;
the server is used for constructing a social graph according to the vertex information and the weight information;
a query user in the users uploads a starting and ending point identifier to the server;
the server generates a path sequence and a weight sequence according to the social graph and the starting and ending point identification;
the server sends the weight sequence to the inquiry user so that the inquiry user can determine a ciphertext position;
the inquiry user determines an optimal path from the path sequence by adopting an inadvertent transmission mode according to the ciphertext position;
the method comprises the following steps that the trusted center generates system parameters and a secret key, and sends the system parameters to a server and a user, and specifically comprises the following steps:
acquiring a safety parameter kappa;
calculating a master public key mpk and a master key msk of the encryption algorithm according to the security parameters, wherein mpk is (g) msk ,g,p),
Figure FDA0003766897340000011
p is a large prime number and satisfies | p | ═ κ,
Figure FDA0003766897340000012
is [1, p-1 ]]In an arbitrary integer, g is
Figure FDA0003766897340000013
Selecting a random number R, wherein R < p/3;
obtaining a key pair (sk) 1 ,sk 2 ) The key pair includes a first key sk 1 And a second key sk 2 Wherein, in the process,
Figure FDA0003766897340000014
sk 1 +sk 2 =mskmod(p-1);
randomly acquiring n user key vectors
Figure FDA0003766897340000015
Wherein the content of the first and second substances,
Figure FDA0003766897340000016
issuing parameter information, wherein the parameter information comprises the master public key, the generator, the prime number and the random number;
the registering of the user specifically includes:
sending a first registration request;
the trusted center randomly selects an integer from the integer sequence as the identity ID of the current user according to the first registration request i And combining the key vector
Figure FDA0003766897340000017
Returning to the current user;
sending the identification ID to all users connected with the current user i
The inquiring user obtains the ID i Post-sending second registrationRequesting;
the trusted center returns the first key sk to the inquiring user according to the second registration request 1
The server performs registration, specifically including:
sending a third registration request;
the trusted center returns the second key sk to the server according to the third registration request 2
The user constructs vertex information and weight information, and sends ciphertext information generated in the process of constructing the vertex information and the weight information to the server, and the method specifically comprises the following steps:
obtaining the USER i Attribute information of (2);
binarizing the attribute information through one-hot coding to enable the value of only one bit in a binary value corresponding to each dimension attribute to be 1; the current USER USER i Capable of converting all discrete attributes of an individual into an attribute vector of length l
Figure FDA0003766897340000021
The current USER USER i According to the key vector
Figure FDA0003766897340000022
Encrypting the attribute vector
Figure FDA0003766897340000023
Deriving vertex information v in a social network i
USER for each connected USER j The current USER USER i Sending an application to the trusted center;
the trusted center returns a weight key according to the application;
calculating a weight ciphertext by using the encryption homomorphism property and the weight key, and sending the weight ciphertext to a server;
the server integrates the ciphertext to obtain weight information;
the server sends the weight sequence to the query user, so that the query user determines a ciphertext position, which specifically includes:
according to the second key sk 2 Decrypting the weight sequence
Figure FDA0003766897340000024
Each element of (a) obtains a first sequence of decryption weights
Figure FDA0003766897340000025
And sending the information to the inquiry user;
the inquiring user is according to the first key sk 1 Decrypting the first decrypted weight sequence
Figure FDA0003766897340000026
Get a second decryption weight sequence
Figure FDA0003766897340000027
According to the second decryption weight sequence
Figure FDA0003766897340000028
Obtaining a ciphertext position;
the method for determining the optimal path from the path sequence by the inquiry user in an oblivious transmission mode according to the ciphertext position specifically comprises the following steps:
the server sends q random integers C to the inquiring user h
Figure FDA0003766897340000031
Wherein q is a sequence of paths
Figure FDA0003766897340000032
The number of the elements in the Chinese character,
Figure FDA0003766897340000033
the querying user generates a key
Figure FDA0003766897340000034
Calculating q public keys and sending each public key to the server, wherein the public key corresponding to the ciphertext position is generated by a secret key k, and the rest public keys are generated according to the public key and the integer C h Generating;
the server checks each public key to obtain a check result;
the server encrypts a path sequence by using the public key according to the check result and sends the path sequence to the inquiry user;
and the inquiry user decrypts the path ciphertext corresponding to the ciphertext position in the path sequence according to the key k, and can determine the optimal path of the social network by an accidental transmission mode.
2. The method as claimed in claim 1, wherein the server generates a path sequence according to the social graph and the start and end point id
Figure FDA00037668973400000311
Sum weight sequence
Figure FDA00037668973400000312
The method specifically comprises the following steps:
determining a vertex v corresponding to a starting point identifier in the social graph s And is defined as a first layer starting vertex set S 1 (ii) a Finding the vertex v corresponding to the terminal point identification t And is defined as a first layer termination vertex set T 1
Determining the first layer starting vertex set S 1 And the first layer termination vertex set T 1 Is denoted by v u Wherein v is u ∈{S 1 ∩T 1 According to the societyIntersection query vertex v s And v u And v u And v t The weights between them are respectively marked as E s,u And E u,t D, E is to s,u ·E u,t Is added to
Figure FDA0003766897340000035
In, query vertex v simultaneously u Corresponding identity ID u Will ID u Is added to
Figure FDA0003766897340000036
Performing the following steps;
determining the first set of starting vertices S from the social graph 1 Each vertex of (a)
Figure FDA0003766897340000037
All connected vertices v of j And is defined as the second layer initial vertex set S 2 While v is being measured i →v j Adding to a set of prepositioned vertices P 1
Determining the second layer starting vertex set S 2 And the first layer termination vertex set T 1 Is updated by v u Wherein v is u ∈{S 2 ∩T 1 At the same time in the set of front vertices P 1 In finding v u And is denoted by v i Sequentially querying vertexes v according to the social graph s And v i 、v i And v u And v u And v t The weights between are respectively marked as E s,i 、E i,u And E u,t A 1 is mixing E s,i ·E i,u ·E u,t Is added to
Figure FDA0003766897340000038
In, query vertex v simultaneously i And v u Corresponding identification ID i And ID u Will ID i ·R+ID u Is added to
Figure FDA0003766897340000039
Performing the following steps;
determining the first-tier set of termination vertices T from the social graph 1 Each vertex of (1)
Figure FDA00037668973400000310
All connected vertices v of j′ And is defined as a second layer termination vertex set T 2 While v is being measured i′ →v j′ Adding to the post-vertex set P 2
Determining the second layer starting vertex set S 2 And the second layer termination vertex set T 2 Is updated by v u Wherein v is u ∈{S 2 ∩T 2 At the same time in the set of front vertices P 1 In finding v u And is denoted as v i At said set of post-vertices P 2 In finding v u Is denoted by v i′ Sequentially querying vertexes v according to the social graph s And v i 、v i And v u 、v u And v i′ And v i′ And v t The weights between are respectively marked as E s,i 、E i,u 、E u,i′ And E i′,t A 1 is mixing E s,i ·E i,u ·E u,i′ ·E i′,t Is added to
Figure FDA0003766897340000041
In, query vertex v simultaneously i 、v i′ And v u Corresponding identification ID i 、ID i′ And ID u Will ID i ·R 2 +ID u ·R+ID i′ Is added to
Figure FDA0003766897340000042
In (1), get the path sequence
Figure FDA0003766897340000043
Sum weight sequence
Figure FDA0003766897340000044
3. A system for protecting user privacy in a social network, the system being configured to implement the optimal path matching method for protecting user privacy in a social network according to any one of claims 1-2, the system comprising: the system comprises a trusted center, a server and a user, wherein the trusted center is used for generating system parameters and a secret key and sending the system parameters to the server; the method comprises the steps that after the user registers, vertex information and weight information are constructed, ciphertext information generated in the process of constructing the vertex information and the weight information is sent to a server, the server is used for constructing a social graph according to the vertex information and the weight information after registering, a query user in the user is used for providing identification marks of the user and a target user, the server is used for querying all propagation paths and corresponding weights, and an optimal path is provided for the query user through an inadvertent transmission mode.
CN202010363822.1A 2020-04-30 2020-04-30 System for protecting user privacy in social network and optimal path matching method Active CN111526155B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010363822.1A CN111526155B (en) 2020-04-30 2020-04-30 System for protecting user privacy in social network and optimal path matching method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010363822.1A CN111526155B (en) 2020-04-30 2020-04-30 System for protecting user privacy in social network and optimal path matching method

Publications (2)

Publication Number Publication Date
CN111526155A CN111526155A (en) 2020-08-11
CN111526155B true CN111526155B (en) 2022-09-09

Family

ID=71908523

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010363822.1A Active CN111526155B (en) 2020-04-30 2020-04-30 System for protecting user privacy in social network and optimal path matching method

Country Status (1)

Country Link
CN (1) CN111526155B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112492586B (en) * 2020-11-23 2023-05-23 中国联合网络通信集团有限公司 Encryption transmission scheme optimization method and device
CN112989386B (en) * 2021-03-31 2023-09-22 苏州黑云智能科技有限公司 Blacklist sharing method and system based on careless transmission
CN113536366B (en) * 2021-06-09 2022-07-05 湖北工业大学 Privacy protection tracing system and method for close contacts of infectious disease patients

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107347096A (en) * 2017-07-07 2017-11-14 安徽大学 A kind of location privacy protection method based on Cloud Server
CN109728904A (en) * 2018-12-28 2019-05-07 沈阳航空航天大学 A kind of spatial network querying method for protecting privacy
CN110569413A (en) * 2019-08-16 2019-12-13 湖北工业大学 Indexing system and method for protecting member privacy in social network
CN110933050A (en) * 2019-11-18 2020-03-27 湖北工业大学 Privacy protection position sharing system and method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8130947B2 (en) * 2008-07-16 2012-03-06 Sap Ag Privacy preserving social network analysis

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107347096A (en) * 2017-07-07 2017-11-14 安徽大学 A kind of location privacy protection method based on Cloud Server
CN109728904A (en) * 2018-12-28 2019-05-07 沈阳航空航天大学 A kind of spatial network querying method for protecting privacy
CN110569413A (en) * 2019-08-16 2019-12-13 湖北工业大学 Indexing system and method for protecting member privacy in social network
CN110933050A (en) * 2019-11-18 2020-03-27 湖北工业大学 Privacy protection position sharing system and method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network.";Gao, Chong-zhi, et al.;《Cluster Computing 》;20180202;第22卷(第1期);第1655-1663页 *
"Privacy preserving in cloud environment for obstructed shortest path query.";Zhang, Lei, et al.;《Wireless Personal Communications》;20170819;第96卷(第2期);第2305-2322页 *
"SPCSS: social network based privacy-preserving criminal suspects sensing.";Xu, Jian, et al.;《IEEE Transactions on Computational Social Systems》;20200115;第7卷(第1期);第261-274页 *

Also Published As

Publication number Publication date
CN111526155A (en) 2020-08-11

Similar Documents

Publication Publication Date Title
CN111526155B (en) System for protecting user privacy in social network and optimal path matching method
Feng et al. An efficient privacy-preserving authentication model based on blockchain for VANETs
CN110719159A (en) Multi-party privacy set intersection method for resisting malicious enemies
JP2016512611A (en) Privacy Protection Ridge Return
WO2015024149A1 (en) Method for establishing anti-attack public key cryptogram
CN108632237A (en) A kind of position service method based on the anonymity of more Anonymizers
EP2792098B1 (en) Group encryption methods and devices
Velliangiri et al. An efficient lightweight privacy-preserving mechanism for industry 4.0 based on elliptic curve cryptography
JP6229716B2 (en) Verification system, node, verification method and program
US20180302220A1 (en) User attribute matching method and terminal
CN113905047A (en) Space crowdsourcing task allocation privacy protection method and system
JPWO2014185450A1 (en) Verification system, node, verification method and program
CN110730064A (en) Data fusion method based on privacy protection in crowd sensing network
Badr et al. Blockchain-based ride-sharing system with accurate matching and privacy-preservation
Qin et al. Simultaneous authentication and secrecy in identity-based data upload to cloud
CN104539425B (en) Multi-receiver label decryption method based on multivariable, many security attributes
Alamer et al. A privacy-preserving scheme to support the detection of multiple similar request-real-time services in IoT application systems
JP2002026892A (en) Key sharing method, private key generating method, common key generating method, encryption communication method, private key generator, common key generator, encryption communication system and recording medium
Li et al. Priexpress: Privacy-preserving express delivery with fine-grained attribute-based access control
Lai et al. SPGS: a secure and privacy‐preserving group setup framework for platoon‐based vehicular cyber‐physical systems
Wang et al. Secure content sharing protocol for D2D users based on profile matching in social networks
CN109257167B (en) Resource allocation method for protecting privacy in fog calculation
JP5799635B2 (en) ENCRYPTED DATA SEARCH SYSTEM, DEVICE, METHOD, AND PROGRAM
WO2018174063A1 (en) Collating system, method, device, and program
KR101760600B1 (en) A Trustless Broker Based Protocol to Discover Friends in Proximity-Based Mobile Social Network and System Therefor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant