Privacy-Preserving Profile Matching Protocol Considering Conditions
A social matching service has recently become popular. These services help a user to search friends having common preference or interest. On the other hand, users use their personal information for matching in social matching services, and thus the privacy-preserving profile matching protocols have been well studied. However, although there are various privacy-preserving profile matching protocols, they may cause unwilling matching. In order to solve this problem, it is necessary to achieve a fine-grained matching mechanism considering conditions.
In this paper, we propose a privacy-preserving profile matching protocol embedded with homomorphic encryption considering conditions: matching is established only when the conditions are satisfied. Our protocol reduces computational cost of user’s device by using the map-to-prime technique and setting an honest-but-curious server. Furthermore, even if a server is attacked, user’s secret key or personal data does not leak since our protocol is designed for a server without such confidential data.
KeywordsPrivacy Profile matching Homomorphic encryption Mobile social networks
This work was partly supported by Grant-in-Aid for Scientific Research (C) (16K00183).
- 1.Abbas, F., Rajput, U., Hussain, R., Eun, H., Oh, H.: A trustless broker based protocol to discover friends in proximity-based mobile social networks. In: Rhee, K.-H., Yi, J.H. (eds.) WISA 2014. LNCS, vol. 8909, pp. 216–227. Springer, Heidelberg (2015). doi: 10.1007/978-3-319-15087-1_17 Google Scholar
- 3.He, D., Cao, Z., Dong, X., Shen, J.: User self-controllable profile matching for privacy-preserving mobile social networks. IEEE ICCS 2014, 248–252 (2014)Google Scholar
- 6.Sarpong, S., Xu, C., Zhang, X.: An authenticated privacy-preserving attribute matchmaking protocol for mobile social networks. Int. J. Netw. Secur. 17(3), 357–364 (2015)Google Scholar
- 7.Sarpong, S., Xu, C., Zhang, X.: PPAM: privacy-preserving attributes matchmaking protocol for mobile social networks secure against malicious users. Int. J. Netw. Secur. 18(4), 625–632 (2016)Google Scholar
- 9.Zhang, R., Zhang, Y., Sun, J.S., Yan, G.: Fine-grained private matching for proximity-based mobile social networking. IEEE INFOCOM 2012, 1–9 (2012)Google Scholar