[1] |
FREEDMAN M J , HAZAY C , NISSIM K ,et al. Efficient set intersection with simulation-based security[J]. Journal of Cryptology, 2016,29(1): 115-155.
|
[2] |
GAO C Z , CHENG Q , LI X ,et al. Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network[J]. Cluster Computing, 2019,22(1): 1655-1663.
|
[3] |
ATENIESE G , FRANCATI D , NU?EZ D , ,et al. Match me if you can:matchmaking encryption and its applications[J]. Journal of Cryptology, 2021,34(3): 1-50.
|
[4] |
YI X , BERTINO E , RAO F Y ,et al. Privacy-preserving user profile matching in social networks[J]. IEEE Transactions on Knowledge and Data Engineering, 2020,32(8): 1572-1585.
|
[5] |
LIU Q , WU S X , PEI S Y ,et al. Secure and efficient multi-attribute range queries based on comparable inner product encoding[C]// Proceedings of 2018 IEEE Conference on Communications and Network Security. Piscataway:IEEE Press, 2018: 1-9.
|
[6] |
AGRAWAL R , EVFIMIEVSKI A , SRIKANT R . Information sharing across private databases[C]// Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data. New York:ACM Press, 2003: 86-97.
|
[7] |
VON ARB M , BADER M , KUHN M ,et al. VENETA:serverless friend-of-friend detection in mobile social networking[C]// Proceedings of 2008 IEEE International Conference on Wireless and Mobile Computing,Networking and Communications. Piscataway:IEEE Press, 2008: 184-189.
|
[8] |
MAHMOUD M , RABIEH K , SHERIF A ,et al. Privacy-preserving fine-grained data retrieval schemes for mobile social networks[J]. IEEE Transactions on Dependable and Secure Computing, 2019,16(5): 871-884.
|
[9] |
LUO E T , GUO K H , TANG Y Y ,et al. Hidden the true identity and dating characteristics based on quick private matching in mobile social networks[J]. Future Generation Computer Systems, 2020,109: 633-641.
|
[10] |
SHEN H J , ZHOU J , CAO Z F ,et al. Blockchain-based lightweight certificate authority for efficient privacy-preserving location-based service in vehicular social networks[J]. IEEE Internet of Things Journal, 2020,7(7): 6610-6622.
|
[11] |
LI J , ZENG F Z , XIAO Z ,et al. Drive2friends:inferring social relationships from individual vehicle mobility data[J]. IEEE Internet of Things Journal, 2020,7(6): 5116-5127.
|
[12] |
PENG T , LIU Q , WANG G J ,et al. Multidimensional privacy preservation in location-based services[J]. Future Generation Computer Systems, 2019,93: 312-326.
|
[13] |
LIU Q , HOU P L , WANG G J ,et al. Intelligent route planning on large road networks with efficiency and privacy[J]. Journal of Parallel and Distributed Computing, 2019,133: 93-106.
|
[14] |
LIU Q , PENG Y , WU J ,et al. Secure multi-keyword fuzzy searches with enhanced service quality in cloud computing[J]. IEEE Transactions on Network and Service Management, 2021,18(2): 2046-2062.
|
[15] |
LIU Q , PENG Y , PEI S Y ,et al. Prime inner product encoding for effective wildcard-based multi-keyword fuzzy search[J]. IEEE Transactions on Services Computing, 2022,15(4): 1799-1812.
|
[16] |
李宇溪, 周福才, 徐紫枫 . 支持K-近邻搜索的移动社交网络隐私保护方案[J]. 计算机学报, 2021,44(7): 1481-1500.
|
|
LI Y X , ZHOU F C , XU Z F . Privacy preserving K-nearest-neighbor search over mobile social network[J]. Chinese Journal of Computers, 2021,44(7): 1481-1500.
|
[17] |
崔炜荣, 杜承烈 . 社交网络中基于CP-ABE的隐私保护属性匹配方法[J]. 计算机应用, 2018,38(4): 1051-1057.
|
|
CUI W R , DU C L . Privacy preserving attribute matching method based on CP-ABE in social networks[J]. Journal of Computer Applications, 2018,38(4): 1051-1057.
|
[18] |
LUO E T , LIU Q , ABAWAJY J H ,et al. Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks[J]. Future Generation Computer Systems, 2017,68: 222-233.
|
[19] |
SAMANTHULA B K , ELMEHDWI Y , HOWSER G ,et al. A secure data sharing and query processing framework via federation of cloud computing[J]. Information Systems, 2015,48: 196-212.
|
[20] |
XU G Q , LIU B Y , JIAO L T ,et al. Trust2Privacy:a novel fuzzy trust-to-privacy mechanism for mobile social networks[J]. IEEE Wireless Communications, 2020,27(3): 72-78.
|
[21] |
LI F H , HE Y Y , NIU B ,et al. Small-world:secure friend matching over physical world and social networks[J]. Information Sciences, 2017,387: 205-220.
|
[22] |
ZHANG L , LI X Y , LIU K B ,et al. Message in a sealed bottle:privacy preserving friending in mobile social networks[J]. IEEE Transactions on Mobile Computing, 2014,14(9): 1888-1902.
|
[23] |
PENG T , GUAN K , LIU J ,et al. A blockchain-based mobile crowdsensing scheme with enhanced privacy[J]. Concurrency and Computation:Practice and Experience, 2021:doi.org/10.1002/cpe.6664.
|
[24] |
PENG T , GUAN K , LIU J . A privacy-preserving mobile crowdsensing scheme based on blockchain and trusted execution environment[J]. The IEICE Transactions on Information and Systems,2021:doi.org/10.1587/transinf. 2021BCP0001.
|
[25] |
DING X F , WANG Z , ZHOU P ,et al. Efficient and privacy-preserving multi-party skyline queries over encrypted data[J]. IEEE Transactions on Information Forensics and Security, 2021,16: 4589-4604.
|
[26] |
LIU L , CHEN R M , LIU X M ,et al. Towards practical privacy-preserving decision tree training and evaluation in the cloud[J]. IEEE Transactions on Information Forensics and Security, 2020,15: 2914-2929.
|
[27] |
PENG T , LIU Q , MENG D ,et al. Collaborative trajectory privacy preserving scheme in location-based services[J]. Information Sciences, 2017,387: 165-179.
|
[28] |
LIU Q , TIAN Y , WU J ,et al. Enabling verifiable and dynamic ranked search over outsourced data[J]. IEEE Transactions on Services Computing, 2022,15(1): 69-82.
|
[29] |
WANG J . Encyclopedia of data warehousing and mining[M]. Hershey: IGI Global, 2005.
|