System for protecting user privacy in social network and optimal path matching method
A social network and user privacy technology, applied in the field of user privacy protection systems and optimal path matching, it can solve the problem that the definition of weight information is not accurate enough, cannot guarantee the practicability accuracy and efficiency of large social networks, and does not consider vertices. interaction issues
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0126] The present invention provides an optimal path matching method for protecting user privacy in a social network, comprising the following steps:
[0127] Step 1: System parameter generation.
[0128] Step 1.1: The trusted center (TA) selects the security parameter κ, and calculates the master public key of the ElGamal encryption algorithm (mpk=g msk ,g,p) and master key Where p is a large prime number and satisfies |p|=κ, g is A generator of . Choose a random number R, where |R|<|p| / 3.
[0129] Step 1.2: TA selects a pair of keys (sk 1 ,sk 2 ),in make sk 1 +sk 2 = msk mod(p-1).
[0130] Step 1.3: TA randomly selects n user key vectors
[0131] Step 1.4: TA publishes parameters (mpk, g, p, R).
[0132] The entity registration process involves Figure 4 .
[0133] Step 2: Entity registration.
[0134] Step 2.1: User USER i (i=1,2,...,n) registration.
[0135] Step 2.1.1: User USER i (i=1,2,...,n) Send a registration request.
[0136] Step 2.1.2: TA r...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


