Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Friend recommendation system and method based on hidden strategy attribute base encryption

An attribute-based encryption and friend recommendation technology, which is applied in the field of social network privacy protection, can solve data privacy leakage and other problems, and achieve the effect of reducing decryption costs and information encryption costs

Active Publication Date: 2022-06-21
SHANDONG NORMAL UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The inventors found that when people join mobile social networks, they will build characteristic profile attributes, such as current location, diet, shopping preferences, etc., and then they will share their profile with nearby users who are willing to make friends; but in During the process of matching friends, the leakage of some personal information, such as location privacy, identity privacy, data privacy, etc., may easily lead to some unexpected consequences

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Friend recommendation system and method based on hidden strategy attribute base encryption
  • Friend recommendation system and method based on hidden strategy attribute base encryption
  • Friend recommendation system and method based on hidden strategy attribute base encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] The purpose of this embodiment is to provide a friend recommendation system based on hidden policy attribute base encryption.

[0040] A friend recommendation system based on hidden policy attribute base encryption, comprising:

[0041] A trusted center, configured to provide registration services to publishers and requesters, and to perform key distribution;

[0042] The matching server is configured to receive and store the publisher's self-described ciphertext and the interest ciphertext from the requester; and analyze whether the publisher's self-described information matches the requester's interest, and recommend friends according to the matching result;

[0043]The publisher is configured to encrypt its self-describing information according to the requester's interest policy, and send its self-describing ciphertext to the matching server; at the same time, add the corresponding tag attribute to its self-describing so that interested requesters can receive To the...

Embodiment 2

[0080] The purpose of this embodiment is to provide a friend recommendation method based on hidden policy attribute base encryption.

[0081] like figure 2 As shown, a flowchart of a friend recommendation method based on hidden policy attribute base encryption provided by the present disclosure, the steps include:

[0082] Step 1: In the initialization phase, the trusted center generates the public key PK and the system master key SK, the organization registers the publisher and the requester, and generates the interest attribute key for the requester;

[0083] Step 2: The matching server collects the requester's ciphertext of interest;

[0084] Step 3: The publisher encrypts the personal information ciphertext and sends it along with his self-describing ciphertext policy, and sends the self-describing tag key to the matching server;

[0085] Step 4: The matching server analyzes the interest ciphertext obtained from the requester and the publisher's self-describing cipherte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure provides a friend recommendation system and method based on hidden policy attribute-based encryption. The scheme applies the linear secret sharing strategy to user matching in social networks, and uses the improved anonymous ciphertext policy attribute-based encryption user matching method To establish a formal social relationship between users, which improves the security of privacy protection; at the same time, most of the work of encryption is transferred to the preparation process, which can be operated once and used for all information encryption, effectively reducing the publisher's information encryption Overhead, the key encapsulation method is adopted for the information decryption key, and most of the information decryption cost is allocated to the service platform, thereby reducing the requester's decryption overhead.

Description

technical field [0001] The present disclosure relates to the technical field of social network privacy protection, and in particular, to a friend recommendation system and method based on hidden policy attribute base encryption. Background technique [0002] The statements in this section merely provide background information related to the present disclosure and do not necessarily constitute prior art. [0003] With the growth of mobile devices, the applications of mobile social networks have been widely applied to smartphones and tablets, such as WeChat, QQ, Meituan, Weibo, etc. Profile matching is an effective way to discover new friends in mobile social networks. The inventors found that when people join a mobile social network, they will establish characteristic profile attributes, such as current location, diet, shopping preferences, etc., and then they will share their profiles with nearby users who are willing to make friends; but in In the process of matching frie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L51/04H04L51/214H04L51/52
CPCH04L63/0428H04L63/062H04L63/0421H04L63/205H04L51/04H04L51/214H04L51/52
Inventor 吴磊赵胜男
Owner SHANDONG NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products