2014
DOI: 10.1002/cpe.3284
|View full text |Cite
|
Sign up to set email alerts
|

Efficient privacy preserving matchmaking for mobile social networking

Abstract: SUMMARYDiscovering new friends who share common attributes, named as matchmaking, is one of the most popular applications in mobile social networking. The key security issue in matchmaking is to protect users' personal information. In this paper, we propose a novel privacy preserving matchmaking framework, which can help users to find new friends in mobile social networking without leaking their privacy information. A user (called initiator) can find the one who shares maximum number of common attributes with … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 36 publications
0
4
0
Order By: Relevance
“…The protocols in [5] paved the way for secure commutative based matchmaking. The protocols [6] and [7] improved the functionality and shortcomings of [5]; however, they introduced trust related issues as well as allowed malicious users to go unnoticed after cheating. The authors of [8] successfully eliminated above mentioned flaws but their protocol is slightly costlier in terms of communications and computation.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…The protocols in [5] paved the way for secure commutative based matchmaking. The protocols [6] and [7] improved the functionality and shortcomings of [5]; however, they introduced trust related issues as well as allowed malicious users to go unnoticed after cheating. The authors of [8] successfully eliminated above mentioned flaws but their protocol is slightly costlier in terms of communications and computation.…”
Section: Discussionmentioning
confidence: 99%
“…Wang et al [7] proposed another protocol that attempt to overcome the shortcomings of both [5] and [6]. First, the protocol in [7] combines the two trusted servers into a single server.…”
Section: Wang Et Al Protocolmentioning
confidence: 99%
See 2 more Smart Citations