2011 International Conference on Computational Aspects of Social Networks (CASoN) 2011
DOI: 10.1109/cason.2011.6085916
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving profile matching using the social graph

Abstract: We present a privacy-preserving protocol for users to test a match with potential new friends in an environment where all users cryptographically encrypt their private information. The following scenario is considered. Suppose that user Alice thinks that Bob might be a good new friend. So, Alice and the Online Social Network (representing Bob) engage in a twoparty matching protocol. In this protocol no work from Bob is required, Bob can be offline. The matching protocol is designed to give Alice an indication … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…The goal is to query or mine graph data while simultaneously maintaining the privacy of the property and/or structure data of the graph. Privacy-preserving graph analysis has been used to study many problems, i.e., subgraph query [40] , vertex reachability [41] , inference attacks [42] , shortest path [43] , spanning tree [44] , and graph matching [45] . In this paper, for the first time, we consider the problem of privacypreserving graph clustering with both relationship and location information.…”
Section: Related Workmentioning
confidence: 99%
“…The goal is to query or mine graph data while simultaneously maintaining the privacy of the property and/or structure data of the graph. Privacy-preserving graph analysis has been used to study many problems, i.e., subgraph query [40] , vertex reachability [41] , inference attacks [42] , shortest path [43] , spanning tree [44] , and graph matching [45] . In this paper, for the first time, we consider the problem of privacypreserving graph clustering with both relationship and location information.…”
Section: Related Workmentioning
confidence: 99%
“…Secondly, we propose a solution for protecting users' private profile attributes in OSNs. In the solution, a transitive and uni-directional proxy reencryption scheme [5] allows users to encrypt their private profile attributes with their own public keys. Based on the unilateral set intersection cardinality protocol, we design an Online-Offline profile matching protocol, which allows two users to compute their profile similarity and one of them can stay offline.…”
Section: Our Contributionmentioning
confidence: 99%
“…The proposed solution employs transitive and uni-directional proxy re-encryption cryptosystem , namely (KeyGen, Enc, Dec, Pextract, Preenc) [5], and the following two new protocols.…”
Section: New Cryptographic Building Blocksmentioning
confidence: 99%
See 1 more Smart Citation