{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:44:06Z","timestamp":1740149046285,"version":"3.37.3"},"reference-count":16,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,9,21]],"date-time":"2020-09-21T00:00:00Z","timestamp":1600646400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&D Program of China","award":["2017YFB0802000","U19B2021","U1736111","MMJJ20180111","2020ZDLGY08-04","18HASTIT022"],"award-info":[{"award-number":["2017YFB0802000","U19B2021","U1736111","MMJJ20180111","2020ZDLGY08-04","18HASTIT022"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2017YFB0802000","U19B2021","U1736111","MMJJ20180111","2020ZDLGY08-04","18HASTIT022"],"award-info":[{"award-number":["2017YFB0802000","U19B2021","U1736111","MMJJ20180111","2020ZDLGY08-04","18HASTIT022"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2017YFB0802000","U19B2021","U1736111","MMJJ20180111","2020ZDLGY08-04","18HASTIT022"],"award-info":[{"award-number":["2017YFB0802000","U19B2021","U1736111","MMJJ20180111","2020ZDLGY08-04","18HASTIT022"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Cryptography Development Fund","award":["2017YFB0802000","U19B2021","U1736111","MMJJ20180111","2020ZDLGY08-04","18HASTIT022"],"award-info":[{"award-number":["2017YFB0802000","U19B2021","U1736111","MMJJ20180111","2020ZDLGY08-04","18HASTIT022"]}]},{"name":"Key Research and Development Program of Shaanxi","award":["2017YFB0802000","U19B2021","U1736111","MMJJ20180111","2020ZDLGY08-04","18HASTIT022"],"award-info":[{"award-number":["2017YFB0802000","U19B2021","U1736111","MMJJ20180111","2020ZDLGY08-04","18HASTIT022"]}]},{"name":"Program for Science and Technology Innovation Talents in the Universities of Henan Province","award":["2017YFB0802000","U19B2021","U1736111","MMJJ20180111","2020ZDLGY08-04","18HASTIT022"],"award-info":[{"award-number":["2017YFB0802000","U19B2021","U1736111","MMJJ20180111","2020ZDLGY08-04","18HASTIT022"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,9,21]]},"abstract":"<jats:p>Due to the transparency of the wireless channel, users in multiple-key environment are vulnerable to eavesdropping during the process of uploading personal data and re-encryption keys. Besides, there is additional burden of key management arising from multiple keys of users. In addition, profile matching using inner product between vectors cannot effectively filter out users with ulterior motives. To tackle the above challenges, we first improve a homomorphic re-encryption system (HRES) to support a single homomorphic multiplication and arbitrarily many homomorphic additions. The public key negotiated by the clouds is used to encrypt the users\u2019 data, thereby avoiding the issues of key leakage and key management, and the privacy of users\u2019 data is also protected. Furthermore, our scheme utilizes the homomorphic multiplication property of the improved HRES algorithm to compute the cosine result between the normalized vectors as the standard for measuring the users\u2019 proximity. Thus, we can effectively improve the social experience of users.<\/jats:p>","DOI":"10.1155\/2020\/4938736","type":"journal-article","created":{"date-parts":[[2020,9,21]],"date-time":"2020-09-21T23:31:13Z","timestamp":1600731073000},"page":"1-12","source":"Crossref","is-referenced-by-count":2,"title":["Improved Cloud-Assisted Privacy-Preserving Profile-Matching Scheme in Mobile Social Networks"],"prefix":"10.1155","volume":"2020","author":[{"given":"Ying","family":"Zou","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"},{"name":"Department of Mathematics Teaching and Research, Shanghai Business School, Shanghai, China"}]},{"given":"Yanting","family":"Chai","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, Crptographic Research Center, Xidian University, Xi\u2019an 710071, China"}]},{"given":"Sha","family":"Shi","sequence":"additional","affiliation":[{"name":"Engineering Research Center of Molecular and Neuro Imaging of Ministry of Education of China and School of Life Science and Technology, Xidian University, Xi\u2019an 710071, China"}]},{"given":"Lei","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Yunfeng","family":"Peng","sequence":"additional","affiliation":[{"name":"PBC School of Finance, Tsinghua University, Beijing, China"}]},{"given":"Yuan","family":"Ping","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Xuchang University, Xuchang 461000, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2554-4464","authenticated-orcid":true,"given":"Baocang","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, Crptographic Research Center, Xidian University, Xi\u2019an 710071, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2013.sup.0513057"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1649-y"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/3214303"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1137\/120868669"},{"year":"2013","key":"9"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2013.08.004"},{"key":"15","first-page":"35","volume":"409","year":"2017","journal-title":"Information Sciences"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2013.032513.120149"},{"issue":"9","key":"19","first-page":"1888","volume":"14","year":"2014","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-0853-0"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1090\/s0025-5718-1978-0491431-9"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2019.2931813"},{"first-page":"1005","volume-title":"Secure multiparty computation for privacy preserving data mining","year":"2005","key":"26"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/4938736.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/4938736.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/4938736.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,21]],"date-time":"2020-09-21T23:31:23Z","timestamp":1600731083000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/4938736\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,21]]},"references-count":16,"alternative-id":["4938736","4938736"],"URL":"https:\/\/doi.org\/10.1155\/2020\/4938736","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2020,9,21]]}}}