网络与信息安全学报 ›› 2016, Vol. 2 ›› Issue (8): 62-67.doi: 10.11959/j.issn.2096-109x.2016.00082

• 学术论文 • 上一篇    下一篇

可证明安全的社交网络隐私保护方案

何建琼1,2,3,田有亮1,2,3(),周凯   

  1. 1 贵州大学计算机科学与技术学院,贵州 贵阳 550025
    2 贵州省公共大数据重点实验室,贵州 贵阳 550025
    3 贵州大学密码学与数据安全研究所,贵州 贵阳 550025
  • 修回日期:2016-07-07 出版日期:2016-08-01 发布日期:2017-06-04
  • 作者简介:何建琼(1991-),女,贵州遵义人,贵州大学硕士生,主要研究方向为密码学与安全协议。|田有亮(1982-),男,贵州盘县人,博士,贵州大学教授,主要研究方向为博弈论、密码学与安全协议。|周凯(1991-),男,浙江衢州人,贵州大学硕士生,主要研究方向为密码学与可信计算。
  • 基金资助:
    国家自然科学基金资助项目(61363068);贵州大学研究生创新基金资助项目(2016050)

Provably secure social network privacy-preserving scheme

Jian-qiong HE1,2,3,You-liang TIAN1,2,3(),Kai ZHOU   

  1. 1 College of Computer Science and Technology,Guizhou University,Guiyang 550025,China
    2 Guizhou Provincial Key Laboratory of Public Big Data,Guiyang 550025,China
    3 Institute of Cryptography and Data Security,Guizhou University,Guiyang 550025,China
  • Revised:2016-07-07 Online:2016-08-01 Published:2017-06-04
  • Supported by:
    The National Natural Science Foundation of China(61363068);Graduate Innovation Foundation of Guizhou University(2016050)

摘要:

针对社交网络隐私保护方案的安全性证明问题,提出了一种可证明安全的社交网络隐私保护方案。首先,通过分析社交网络中节点隐私的安全需求(不可区分的节点结构和不可区分的发送消息),分别建立其安全模型;其次,基于该安全模型运用双线性映射构造社交网络节点隐私保护方案;最后,证明了该方案是可证明安全的,并且分析和对比了该方案的安全性,分析结果表明,该方案除了具有可证明安全性外,还能抵抗再识别攻击、推理攻击和信息聚集攻击。

关键词: 可证明安全, 社交网络, 隐私保护, 双线性映射

Abstract:

A provable secure social network privacy-preserving scheme was proposed to solve the problem of social network privacy-preserving scheme's security proof.Firstly,through analyzing the security requirements about the node's privacy (indistinguishable node structure and indistinguishable sending messages),the security model were established separately.Secondly,the bilinear mapping was used to construct the social network privacy-preserving scheme.Finally,it was proved that the scheme was provable secure,the security of the schemes were analyzed and compared.The analysis results show that the scheme not only has provable security,but also can resist re-identify attack,inference attack and information aggregation attack.

Key words: provable secure, social network, privacy-preserving, bilinear mapping

中图分类号: 

No Suggested Reading articles found!