An authorized equality test on identity‐based cryptosystem for mobile social networking applications

Author(s):  
Abdelrhman Hassan ◽  
Rashad Elhabob ◽  
Nabeil Eltayieb ◽  
Yong Wang

2019 ◽  
Vol 30 (04) ◽  
pp. 647-664
Author(s):  
Libing Wu ◽  
Yubo Zhang ◽  
Kim-Kwang Raymond Choo ◽  
Debiao He

Online social networking applications have become more and more popular in the advance of the technological age. Much of our personal information has been disclosed in social networking activities and privacy-preserving still remains a research challenge in social network. Public key encryption scheme with equality test(PKEET), which is an extension of public key encryption with keyword search (PEKS), seems to be a solution. PKEET enables the tester to check whether two given ciphertexts are derived from the same plaintext. Recently, Zhu et al. proposed a pairing-free public key encryption scheme with equality test based on the traditional public key cryptosystem. However, it suffers from certificates management issue. In this paper, we propose a pairing-free identity-based encryption scheme with authorized equality test(PF-IBEAET). The PF-IBEAET scheme also provides fine-grained authorizations. We prove that the scheme is one way secure against chosen identity and chosen ciphertext attack (OW-ID-CCA) and indistinguishable against chosen-identity and chosen-ciphertext attack (IND-ID-CCA) in the random oracle model (ROM). Performance analysis shows that the scheme achieves a better performance than similar schemes.





Author(s):  
NAMRATA PAWAR ◽  
SONALI CHIKHALE

With the development of wireless communication, the popularity of android phones, the increasing of social networking services, mobile social networking has become a hot research topic. Personal mobile devices have become ubiquitous and an inseparable part of our daily lives. These devices have evolved rapidly from simple phones and SMS capable devices to Smartphone’s and now with android phones that we use to connect, interact and share information with our social circles. The Smartphone’s are used for traditional two-way messaging such as voice, SMS, multimedia messages, instant messaging or email. Moreover, the recent advances in the mobile application development frameworks and application stores have encouraged third party developers to create a huge number of mobile applications that allow users to interact and share information in many novel ways. In this paper, we elaborate a flexible system architecture based on the service-oriented specification to support social interactions in campus-wide environments using Wifi. In the client side, we designed a mobile middleware to collect social contexts such as the messaging, creating group, accessing emails etc. The server backend, on the other hand, aggregates such contexts, analyses social connections among users and provides social services to facilitate social interactions. A prototype of mobile social networking system is deployed on campus, and several applications are implemented based on the proposed architecture to demonstrate the effectiveness of the architecture.



2013 ◽  
Vol 5 (1) ◽  
pp. 69-73 ◽  
Author(s):  
Sanjeev Kulkarni ◽  
Kirna Kumari ◽  
Naheeda Kittur

Future shopping applications collect basic profile information of the person and provide great service on recommending books, electronics and other products based on user profile, previous shopping history and relationships between the items categories derived from purchases of all the users on the site. E.g. if someone is looking at action movies it can recommend similar category or a category that the shopper is likely to be associated with. The mining of user's profile greatly enhances a person's shopping experience on modern online shops. The main purpose of this paper is solving the privacy and security issues.



Sign in / Sign up

Export Citation Format

Share Document