Privacy-Preserving Verifiable Graph Intersection Scheme With Cryptographic Accumulators in Social Networks

[1]  Jemal H. Abawajy,et al.  Privacy Preserving Social Network Data Publication , 2016, IEEE Communications Surveys & Tutorials.

[2]  V. Rokhlin,et al.  Fast algorithms for polynomial interpolation, integration, and differentiation , 1996 .

[3]  Jianliang Xu,et al.  Structure-Preserving Subgraph Query Services , 2015, IEEE Transactions on Knowledge and Data Engineering.

[4]  Michael T. Goodrich,et al.  Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems , 2009, Algorithmica.

[5]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[6]  Angelo De Caro,et al.  jPBC: Java pairing based cryptography , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).

[7]  Xi Chen,et al.  Privacy-preserving high-quality map generation with participatory sensing , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[8]  Yuguang Fang,et al.  A Privacy-Preserving Attribute-Based Authentication System for Mobile Health Networks , 2014, IEEE Transactions on Mobile Computing.

[9]  Vitaly Shmatikov,et al.  Privacy-Preserving Graph Algorithms in the Semi-honest Model , 2005, ASIACRYPT.

[10]  De-Nian Yang,et al.  Privacy-Preserving Dense Subgraph Discovery in Mobile Social Networks , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[11]  Jiangtao Cui,et al.  Verifiable Subgraph Matching With Cryptographic Accumulators in Cloud Computing , 2019, IEEE Access.

[12]  Vijayalakshmi Atluri,et al.  Privacy-Preserving Subgraph Discovery , 2012, DBSec.

[13]  Keke Chen,et al.  PrivateGraph: Privacy-Preserving Spectral Analysis of Encrypted Graphs in the Cloud , 2019, IEEE Transactions on Knowledge and Data Engineering.

[14]  Craig Gentry,et al.  Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.

[15]  Luigi Atzori,et al.  Friendship Selection in the Social Internet of Things: Challenges and Possible Strategies , 2015, IEEE Internet of Things Journal.

[16]  Fucai Zhou,et al.  Private Graph Intersection Protocol , 2017, ACISP.

[17]  Ming Li,et al.  Privacy-Preserving Verifiable Set Operation in Big Data for Cloud-Assisted Mobile Crowdsourcing , 2017, IEEE Internet of Things Journal.

[18]  K. Liu,et al.  Towards identity anonymization on graphs , 2008, SIGMOD Conference.

[19]  Qiong Luo,et al.  Scaling Up Subgraph Query Processing with Efficient Subgraph Matching , 2019, 2019 IEEE 35th International Conference on Data Engineering (ICDE).

[20]  Fucai Zhou,et al.  Privacy-Preserving Subgraph Matching Protocol for Two Parties , 2019, Int. J. Found. Comput. Sci..

[21]  Jiankun Hu,et al.  Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection , 2018, IEEE Transactions on Information Forensics and Security.

[22]  Hai Jin,et al.  QuickPoint: Efficiently identifying densest sub-graphs in Online Social Networks for event stream dissemination , 2016, 2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS).

[23]  Jonathan Katz,et al.  Verifiable Graph Processing , 2018, ACM Trans. Priv. Secur..

[24]  Lei Zou,et al.  Privacy Preserving Subgraph Matching on Large Graphs in Cloud , 2016, SIGMOD Conference.

[25]  Roberto Tamassia,et al.  Optimal Verification of Operations on Dynamic Sets , 2011, CRYPTO.

[26]  Rosario Gennaro,et al.  Publicly verifiable delegation of large polynomials and matrix computations, with applications , 2012, IACR Cryptol. ePrint Arch..

[27]  Qinghua Li,et al.  Efficient and Privacy-Aware Data Aggregation in Mobile Sensing , 2014, IEEE Transactions on Dependable and Secure Computing.

[28]  Elisa Bertino,et al.  Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases , 2018, IEEE Transactions on Knowledge and Data Engineering.

[29]  Dan Boneh,et al.  Key Homomorphic PRFs and Their Applications , 2013, CRYPTO.

[30]  Hai Jin,et al.  A Novel Privacy Preserving Framework for Large Scale Graph Data Publishing , 2019, IEEE Transactions on Knowledge and Data Engineering.

[31]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[32]  Hovav Shacham,et al.  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.

[33]  Yevgeniy Vahlis,et al.  Verifiable Delegation of Computation over Large Datasets , 2011, IACR Cryptol. ePrint Arch..

[34]  Omer Paneth,et al.  Verifiable Set Operations over Outsourced Databases , 2014, IACR Cryptol. ePrint Arch..