Journal on Communications ›› 2015, Vol. 36 ›› Issue (12): 163-171.doi: 10.11959/j.issn.1000-436x.2015325

• privacy protection • Previous Articles     Next Articles

Efficient and privacy-preserving profile matching protocols in opportunistic networks

Yong-kai LI1,2,Shu-bo LIU1,2,Zhao-huan YANG1,2,Meng-jun LIU1,2   

  1. 1 School of Computer,Wuhan University,Wuhan 430072,China
    2 Key Laboratory of Aerospace Information Security and Trusted Computing,Ministry of Education,Wuhan 430072,China
  • Online:2015-12-25 Published:2017-07-17
  • Supported by:
    The National Basic Research Program of China(973 Program);The National Natural Science Foundation of China

Abstract:

In opportunistic networks,users can take the advantage of parallel opportunistic contacts with other mobile users and find the appropriate helpers to forward the messages or share the contents.Most of the existing profile-matching protocols were designed on the basis of homomorphic cryptosystem and were not quite efficient in encryption and decryption.Three efficient and privacy-preserving profile matching protocols were proposed to deal with different privacy requirements in opportunistic networks,which do not use any homomorphic encryption.The proposed protocols were proved to be privacy-preserving and correct.The performances of the protocols are thoroughly analyzed and evaluated via real smartphone experiments,and the results show that the proposed protocols can decrease encryption and decryption time by at least an order of magnitude than the Paillier cryptosystem based protocol.

Key words: opportunistic network, help-node finding, privacy-preserving protocol, profile matching

No Suggested Reading articles found!