Privacy-Preserving Verifiable Graph Intersection Scheme With Cryptographic Accumulators in Social Networks
暂无分享,去创建一个
Haipeng Peng | Lixiang Li | Yixian Yang | Xiangjian Zuo | Shoushan Luo | Linming Gong | Shoushan Luo | Yixian Yang | Lixiang Li | Haipeng Peng | Linming Gong | Xiangjian Zuo
[1] Jemal H. Abawajy,et al. Privacy Preserving Social Network Data Publication , 2016, IEEE Communications Surveys & Tutorials.
[2] V. Rokhlin,et al. Fast algorithms for polynomial interpolation, integration, and differentiation , 1996 .
[3] Jianliang Xu,et al. Structure-Preserving Subgraph Query Services , 2015, IEEE Transactions on Knowledge and Data Engineering.
[4] Michael T. Goodrich,et al. Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems , 2009, Algorithmica.
[5] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[6] Angelo De Caro,et al. jPBC: Java pairing based cryptography , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[7] Xi Chen,et al. Privacy-preserving high-quality map generation with participatory sensing , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[8] Yuguang Fang,et al. A Privacy-Preserving Attribute-Based Authentication System for Mobile Health Networks , 2014, IEEE Transactions on Mobile Computing.
[9] Vitaly Shmatikov,et al. Privacy-Preserving Graph Algorithms in the Semi-honest Model , 2005, ASIACRYPT.
[10] De-Nian Yang,et al. Privacy-Preserving Dense Subgraph Discovery in Mobile Social Networks , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[11] Jiangtao Cui,et al. Verifiable Subgraph Matching With Cryptographic Accumulators in Cloud Computing , 2019, IEEE Access.
[12] Vijayalakshmi Atluri,et al. Privacy-Preserving Subgraph Discovery , 2012, DBSec.
[13] Keke Chen,et al. PrivateGraph: Privacy-Preserving Spectral Analysis of Encrypted Graphs in the Cloud , 2019, IEEE Transactions on Knowledge and Data Engineering.
[14] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[15] Luigi Atzori,et al. Friendship Selection in the Social Internet of Things: Challenges and Possible Strategies , 2015, IEEE Internet of Things Journal.
[16] Fucai Zhou,et al. Private Graph Intersection Protocol , 2017, ACISP.
[17] Ming Li,et al. Privacy-Preserving Verifiable Set Operation in Big Data for Cloud-Assisted Mobile Crowdsourcing , 2017, IEEE Internet of Things Journal.
[18] K. Liu,et al. Towards identity anonymization on graphs , 2008, SIGMOD Conference.
[19] Qiong Luo,et al. Scaling Up Subgraph Query Processing with Efficient Subgraph Matching , 2019, 2019 IEEE 35th International Conference on Data Engineering (ICDE).
[20] Fucai Zhou,et al. Privacy-Preserving Subgraph Matching Protocol for Two Parties , 2019, Int. J. Found. Comput. Sci..
[21] Jiankun Hu,et al. Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection , 2018, IEEE Transactions on Information Forensics and Security.
[22] Hai Jin,et al. QuickPoint: Efficiently identifying densest sub-graphs in Online Social Networks for event stream dissemination , 2016, 2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS).
[23] Jonathan Katz,et al. Verifiable Graph Processing , 2018, ACM Trans. Priv. Secur..
[24] Lei Zou,et al. Privacy Preserving Subgraph Matching on Large Graphs in Cloud , 2016, SIGMOD Conference.
[25] Roberto Tamassia,et al. Optimal Verification of Operations on Dynamic Sets , 2011, CRYPTO.
[26] Rosario Gennaro,et al. Publicly verifiable delegation of large polynomials and matrix computations, with applications , 2012, IACR Cryptol. ePrint Arch..
[27] Qinghua Li,et al. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing , 2014, IEEE Transactions on Dependable and Secure Computing.
[28] Elisa Bertino,et al. Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases , 2018, IEEE Transactions on Knowledge and Data Engineering.
[29] Dan Boneh,et al. Key Homomorphic PRFs and Their Applications , 2013, CRYPTO.
[30] Hai Jin,et al. A Novel Privacy Preserving Framework for Large Scale Graph Data Publishing , 2019, IEEE Transactions on Knowledge and Data Engineering.
[31] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[32] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[33] Yevgeniy Vahlis,et al. Verifiable Delegation of Computation over Large Datasets , 2011, IACR Cryptol. ePrint Arch..
[34] Omer Paneth,et al. Verifiable Set Operations over Outsourced Databases , 2014, IACR Cryptol. ePrint Arch..