Two Practical Attribute-Based Encryption Schemes for Privacy-Preserving Mobile Location-Sharing Applications

被引:0
|
作者
Chen, Zhenhua [1 ,2 ]
Li, Ni [3 ]
Huang, Luqi [4 ]
Jia, Xingxing [5 ]
Wang, Yilei [6 ]
Wang, Hao [7 ]
Su, Jing [1 ]
机构
[1] Xian Univ Sci & Technol, Sch Comp Sci & Technol, Xian 710054, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
[3] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Peoples R China
[4] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
[5] Lanzhou Univ, Sch Math & Stat, Lanzhou 730000, Peoples R China
[6] Qufu Normal Univ, Sch Comp Sci, Rizhao 276827, Peoples R China
[7] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan 250061, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2025年 / 12卷 / 05期
基金
中国国家自然科学基金;
关键词
Servers; Privacy; Mobile applications; Security; Public key; Encryption; Computer science; Nickel; Internet of Things; Costs; Attribute-based encryption; location sharing; mobile applications; privacy-preserving;
D O I
10.1109/JIOT.2024.3486175
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Location sharing, as an essential component of mobile applications, helps mobile users share location information and enhance their community connections. However, users may be reluctant to share their locations with personal privacy concerns, as anyone including location server who knows these locations can infer much sensitive information about users through analyzing these locations' information plus their background knowledge. Therefore, it poses a natural question for mobile location-sharing applications how to share users' locations without any breach of their privacy. To answer this question, in this article, we describe two practical attribute-based encryption schemes served privacy-preserving mobile location-sharing applications. Our proposals are quite suitable for such a mobile application-location sharing with common interests since in our designs users' interests are also taken into consideration as well as location information. In particular, our two schemes have a higher performance in the sense that in our first construction both ciphertexts and private keys are of constant size simultaneously, and our second construction is an extension of the first that provides a tradeoff between ciphertext size and public-key size. Therefore, the two schemes we designed in this work are quite practical in mobile applications which are often equipped with limited transmission or storage resources. Finally, we offer a formal security proof under a well-defined security model, followed by an experimental evaluation and a theoretical performance comparison.
引用
收藏
页码:5148 / 5159
页数:12
相关论文
共 50 条
  • [31] A privacy-preserving personal health record with searchability and revocability using attribute-based encryption
    Duan, Shuhong
    Liu, Zhenhua
    Zhou, Peilin
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 831 - 838
  • [32] Privacy-Preserving Online/Offline and Outsourced Multi-Authority Attribute-Based Encryption
    Shao, Jiaye
    Zhu, Yanqin
    Ji, Qijin
    2017 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS 2017), 2017, : 285 - 291
  • [33] Privacy preserving spatio-temporal attribute-based encryption for cloud applications
    Routray, Kasturi
    Bera, Padmalochan
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2025, 28 (01):
  • [34] Dynamic Location Information in Attribute-based Encryption Schemes
    Denisow, Iwailo
    Zickau, Sebastian
    Beierle, Felix
    Kuepper, Axel
    2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 240 - 247
  • [35] Concepts and languages for privacy-preserving attribute-based authentication
    Camenisch, Jan
    Dubovitskaya, Maria
    Enderlein, Robert R.
    Lehmann, Anja
    Neven, Gregory
    Paquin, Christian
    Preiss, Franz-Stefan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 25 - 44
  • [36] A Privacy-Preserving Attribute-Based Access Control Scheme
    Xu, Yang
    Zeng, Quanrun
    Wang, Guojun
    Zhang, Cheng
    Ren, Ju
    Zhang, Yaoxue
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE (SPACCS 2018), 2018, 11342 : 361 - 370
  • [37] Efficient, Verifiable and Privacy Preserving Decentralized Attribute-Based Encryption for Mobile Cloud Computing
    Lyu, Maoxu
    Li, Xuejun
    Li, Hui
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 195 - 204
  • [38] Secure and Privacy-Preserving Attribute-Based Sharing Framework in Vehicles Ad Hoc Networks
    Zhang, Leyou
    Wang, Jun
    Mu, Yi
    IEEE ACCESS, 2020, 8 : 116781 - 116795
  • [39] Location Privacy Preserving Scheme Based on Attribute Encryption
    Lin, Xi
    Han, Yiliang
    Ke, Yan
    Yang, Xiaoyuan
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 164 - 177
  • [40] A privacy preserving attribute-based encryption scheme with user revocation
    Li, Jiguo
    Shi, Yuerong
    Zhang, Yichen
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2281 - 2292