[1] |
许佳捷, 郑凯, 池明旻 ,等. 轨迹大数据:数据、应用与技术现状[J]. 通信学报, 2015,36(12): 97-105.
|
|
XU J J , ZHENG K , CHI M M ,et al. Trajectory big data:data,applications and techniques[J]. Journal on Communications, 2015,36(12): 97-105.
|
[2] |
SHAN Z H , REN K , BLANTON M ,et al. Practical secure computation outsourcing[J]. ACM Computing Surveys, 2019,51(2): 1-40.
|
[3] |
李凤华, 李晖, 贾焰 ,等. 隐私计算研究范畴及发展趋势[J]. 通信学报, 2016,37(4): 1-11.
|
|
LI F H , LI H , JIA Y ,et al. Privacy computing:concept,connotation and its research trend[J]. Journal on Communications, 2016,37(4): 1-11.
|
[4] |
万盛, 李凤华, 牛犇 ,等. 位置隐私保护技术研究进展[J]. 通信学报, 2016,37(12): 124-141.
|
|
WAN S , LI F H , NIU B ,et al. Research progress on location privacy-preserving techniques[J]. Journal on Communications, 2016,37(12): 124-141.
|
[5] |
PAILLIER P , . Public-key cryptosystems based on composite degree residuosity classes[C]// Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 1999: 223-238.
|
[6] |
HUANG Y , EVANS D , K J ,et al. Faster secure {two-party} computation using garbled circuits[C]// Proceedings of 20th USENIX Security Symposium. Berkeley:USENIX Association, 2011:35.
|
[7] |
FREEDMAN M J , NISSIM K , PINKAS B . Efficient private matching and set intersection[C]// Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2004: 1-19.
|
[8] |
HALLGREN P , ORLANDI C , SABELFELD A . PrivatePool:privacy-preserving ridesharing[C]// Proceedings of IEEE 30th Computer Security Foundations Symposium. Piscataway:IEEE Press, 2017: 276-291.
|
[9] |
PAGNIN E , GUNNARSSON G , TALEBI P ,et al. TOPPool:time-aware optimized privacy-preserving ridesharing[J]. Proceedings on Privacy Enhancing Technologies, 2019,2019(4): 93-111.
|
[10] |
A?VODJI U M , HUGUENIN K , HUGUET M J ,et al. SRide:a privacy-preserving ridesharing system[C]// Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. New York:ACM Press, 2018: 40-50.
|
[11] |
LIU A , ZHENGY K , LIZ L ,et al. Efficient secure similarity computation on encrypted trajectory data[C]// Proceedings of IEEE 31st International Conference on Data Engineering. Piscataway:IEEE Press, 2015: 66-77.
|
[12] |
SU H , LIU S C , ZHENG B L ,et al. A survey of trajectory distance measures and performance evaluation[J]. The VLDB Journal, 2020,29(1): 3-32.
|
[13] |
CHEON J H , KIM A , KIM M ,et al. Homomorphic encryption for arithmetic of approximate numbers[C]// Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2017: 409-437.
|
[14] |
LYUBASHEVSKY V , PEIKERT C , REGEV O . On ideal lattices and learning with errors over rings[J]. Journal of the ACM, 2013,60(6): 1-35.
|
[15] |
SMART N P , VERCAUTEREN F . Fully homomorphic SIMD operations[J]. Designs,Codes and Cryptography, 2014,71(1): 57-81.
|
[16] |
QI Y N , ATALLAH M J . Efficient privacy-preserving k-nearest neighbor search[C]// Proceedings of The 28th International Conference on Distributed Computing Systems. Piscataway:IEEE Press, 2008: 311-319.
|
[17] |
HE Y Y , NI J B , WANG X Y ,et al. Privacy-preserving partner selection for ride-sharing services[J]. IEEE Transactions on Vehicular Technology, 2018,67(7): 5994-6005.
|
[18] |
NARAYANAN A , THIAGARAJAN N , LAKHANI M ,et al. Location privacy via private proximity testing[C]// Proceedings of Network and Distributed System Security. Piscataway:IEEE Press, 2011:11.
|
[19] |
SALDAMLI G , CHOW R , JIN HX ,et al. Private proximity testing with an untrusted server[C]// Proceedings of the sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks. NewYork:ACM Press, 2013: 113-118.
|
[20] |
ZHU H , MENG X , KOLLIOS G . Privacy preserving similarity evaluation of time series data[C]// Proceedings of Extending Database Technology. Berlin:Springer, 2014: 499-510.
|
[21] |
许华杰, 吴青华, 胡小明 . 基于轨迹多特性的隐私保护算法[J]. 计算机科学, 2019,46(1): 190-195.
|
|
XU H J , WU Q H , HU X M . Privacy protection algorithm based on multi-characteristics of trajectory[J]. Computer Science, 2019,46(1): 190-195.
|
[22] |
TENG Y P , SHI Z , ZHAO F Y ,et al. Signature-based secure trajectory similarity search[C]// Proceedings of IEEE 20th International Conference on Trust,Security and Privacy in Computing and Communications. Piscataway:IEEE Press, 2021: 196-206.
|
[23] |
TENG Y P , ZHAO F Y , LIU J ,et al. SeTS3:a secure trajectory similarity search system[C]// Proceedings of Database Systems for Advanced Applications. Cham:Springer International Publishing, 2022: 522-526.
|