[1] |
付艳艳, 张敏, 冯登国 ,等. 基于节点分割的社交网络属性隐私保护[J]. 软件学报, 2014,25(4): 768-780.
|
|
FU Y Y , ZHANG M , FENG D G ,et al. Attribute privacy preservation in social networks based on node anatoncy[J]. Journal of Software, 2014,25(4): 768-780.
|
[2] |
DONG W , DAVE V , QIU L . Secure friend discovery in mobile social networks[J]. IEEE Global Communications Conference(INFOCOM), 2015,34(17): 1647-1655.
|
[3] |
LI M , GAO Z , DU S ,et al. PriMatch:fairness-aware secure friend discovery protocol in mobile social network[C]// IEEE Global Communications Conference (GLOBECOM). 2013: 738-743.
|
[4] |
程瑶, 应凌云, 焦四辈 . 移动社交应用的用户隐私泄露问题研究[J]. 计算机学报, 2014,37(1): 87-100.
|
|
CHENG Y , YING L Y , JIAO S B . Research an user privacy leakage in mobile social messaging applications[J]. Chinese Journal of Computers, 2014,37(1): 87-100.
|
[5] |
SARPONG S , XU C . A secure and efficient privacy-preserving attribute matchmaking protocol in proximity-based mobile social networks[J]. Advanced Data Mining and Applications, 2014,8933: 305-318.
|
[6] |
LI M , CAO N , YU S ,et al. Findu:privacy-preserving personal profile matching in mobile social networks[C]// IEEE International Conference on Computer Communications (INFOCOM). 2011, 2(3): 2435-2443.
|
[7] |
YAN Z , DING W , NIEMI V . Two schemes of privacy-preserving trust evaluation[J]. Future Generation Computer Systems, 2016,62(C): 175-189.
|
[8] |
KIRAZ M S , GENC Z A , KARDAS S . Security and efficiency analysis of the hamming distance computation protocol based on oblivious transfer[J]. Security & Communication Networks, 2015,8(18): 4123-4135.
|
[9] |
ZHANG R , ZHANG J , ZHANG Y ,et al. Privacy-preserving profile matching for proximity-based mobile social networking[J]. IEEE Journal on Selected Areas in Communications, 2013,31(9): 656-668.
|
[10] |
NIU B , ZHU X , LIU J . Weight-aware private matching scheme for proximity-based mobile social networks[C]// IEEE Global Communications Conf (GLOBECOM). 2013: 3170-3175.
|
[11] |
ZHU X , CHEN Z , CHI H . Two-party and multi-party private matching for proximity-based mobile social networks[C]// IEEE International Conference on Communications (ICC). 2014: 926-931.
|
[12] |
HAN J , SUSILO W , MU Y . Privacy-preserving decentralized key-policy attribute-based encryption[J]. IEEE Transactions on Parallel & Distributed Systems, 2012,23(11): 2150-2162.
|
[13] |
OSTROVSKY R , SAHAI A , WATERS B . Attribute-based encryption with non-monotonic access structures[C]// CCS 07 ACM Conference on Computer and Communications Security. 2007: 195-203.
|
[14] |
LEWKO A , OKAMOTO T , SAHAI A . Fully secure functional encryption:attribute-based encryption and (hierarchical) inner product encryption[J]. Springer Berlin Heidelberg, 2010,6110: 62-91.
|
[15] |
TAN S F , SAMSUDIN A . Key policy-attribute based fully homomorphic encryption (KP-ABFHE) scheme for securing cloud application in multi-users environment[J].Springer Singapore,2017. Springer Singapore, 2017
|
[16] |
WATERS B . Ciphertext-policy attribute-based encryption:an expressive,efficient,and provably secure realization[J]. Lecture Notes in Computer Science, 2011,2008: 321-334.
|
[17] |
RAO Y S . A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing[J]. Future Generation Computer Systems, 2017,67: 133-151.
|
[18] |
ZHOU Z , HUANG D , WANG Z . Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption[J]. IEEE Transactions on Computers, 2014,64(1): 126-138.
|
[19] |
LUO E , LIU Q , WANG G . Hierachical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks[J]. IEEE Communications Letters, 2016,20(9): 1772-1775.
|
[20] |
BLOMER J A . How to share a secret[J]. Communications of the ACM, 1979,22(22): 612-613.
|
[21] |
BLAKLEY G R . Safeguarding cryptographic keys[J]. IEEE Computer Society Digital Library, 1979: 313-317.
|
[22] |
BENALOH J C , YUNG M . Distributing the power of a government to enhance the privacy of voters[J]. Principles of Distributed Computing Symposium, 1986: 52-62.
|
[23] |
WATERS B . Ciphertext-policy attribute-based encryption:an expressive,efficient,and provably secure realization[J]. Lectures Notes in Computer Science, 2011,2008: 321-334.
|
[24] |
CURTMOLA R , GARAY J , KAMARA S ,et al. Searchable symmetric encryption:improved definitions and efficient constructions[J]. Journal of Computer Security, 2011,19(5): 895-934.
|
[25] |
CHASE M , CHOW S S . Improving privacy and security in multi-authority attribute-based encryption[C]// ACM Conference on Computer and Communications Security. 2009: 121-130.
|
[26] |
LI J , HUANG Q , CHEN X . Multi-authority ciphertext-policy attribute-based encryption with accountability[J]. ACM Symposium on Information, 2011: 386-390.
|
[27] |
JUNG T , LI X , WAN Z . Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption[J]. IEEE Transactions on Information Forensics & Security, 2014,10(1): 190-199.
|
[28] |
CHEUNG L , NEWPORT C . Provably secure ciphertext policy ABE[C]// ACM Conference on Computer and Communications Security. 2007: 456-465.
|
[29] |
EMURA K , MIYAJI A , OMOTE K . A ciphertext-policy attributebased encryption scheme with constant ciphertext length[C]// International Conference on Information Security Practice and Experience. 2009: 13-23.
|
[30] |
ZHOU Z , HUANG D . On efficient ciphertext-policy attribute based encryption and broadcast encryption:extended abstract[J]. IEEE Transactions on Computers, 2010(1).
|
[31] |
HERRANZ J , LAGUILLAUMIE F RàFols C . Constant size ciphertexts in threshold attribute-based encryption[C]// International Conference on Practice and Theory in Public Key Cryptography. 2010: 19-34.
|
[32] |
LAI J , DENG R H , LI Y . Fully secure cipertext-policy hiding CP-ABE[J]. International Conference on Information Security Practice and Experience, 2011,6672(2): 24-39.
|
[33] |
LI X , GU D , REN Y . Efficient ciphertext-policy attribute based encryption with hidden policy[C]// International Conference on Internet& Distributed Computing Systems. 2012: 146-159.
|
[34] |
GE A , ZHANG R , CHEN C . Threshold ciphertext policy attribute-based encryption with constant size ciphertexts[C]// Australasian Conference on Information Security and Privacy, 2012: 336-349.
|
[35] |
CHEN C , CHEN J , LIM H W . Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures[M]. Springer Berlin Heidelbag. 2013: 50-67.
|