Privacy-Preserving Graph Operations for Mobile Authentication
Along with the fast development of wireless technologies, smart devices have become an integral part of our daily life. Authentication is one of the most common and effective methods for these smart devices to prevent unauthorized access. Moreover, smart devices tend to have limited computing power,...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2020-01-01
|
Series: | Wireless Communications and Mobile Computing |
Online Access: | http://dx.doi.org/10.1155/2020/8859213 |
id |
doaj-bc6dd6a5069241d9b35a522fd91270a3 |
---|---|
record_format |
Article |
spelling |
doaj-bc6dd6a5069241d9b35a522fd91270a32020-12-07T09:08:24ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772020-01-01202010.1155/2020/88592138859213Privacy-Preserving Graph Operations for Mobile AuthenticationPeng Li0Fucai Zhou1Zifeng Xu2Yuxi Li3Jian Xu4Software College, Northeastern University, Shenyang, ChinaSoftware College, Northeastern University, Shenyang, ChinaSoftware College, Northeastern University, Shenyang, ChinaSoftware College, Northeastern University, Shenyang, ChinaSoftware College, Northeastern University, Shenyang, ChinaAlong with the fast development of wireless technologies, smart devices have become an integral part of our daily life. Authentication is one of the most common and effective methods for these smart devices to prevent unauthorized access. Moreover, smart devices tend to have limited computing power, and they may possess sensitive data. In this paper, we investigate performing graph operations in a privacy-preserving manner, which can be used for anonymous authentication for smart devices. We propose two protocols that allow two parties to jointly compute the intersection and union of their private graphs. Our protocols utilize homomorphic encryption to prevent information leakage during the process, and we provide security proofs of the protocols in the semihonest setting. At last, we implement and evaluate the efficiency of our protocols through experiments on real-world graph data.http://dx.doi.org/10.1155/2020/8859213 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Peng Li Fucai Zhou Zifeng Xu Yuxi Li Jian Xu |
spellingShingle |
Peng Li Fucai Zhou Zifeng Xu Yuxi Li Jian Xu Privacy-Preserving Graph Operations for Mobile Authentication Wireless Communications and Mobile Computing |
author_facet |
Peng Li Fucai Zhou Zifeng Xu Yuxi Li Jian Xu |
author_sort |
Peng Li |
title |
Privacy-Preserving Graph Operations for Mobile Authentication |
title_short |
Privacy-Preserving Graph Operations for Mobile Authentication |
title_full |
Privacy-Preserving Graph Operations for Mobile Authentication |
title_fullStr |
Privacy-Preserving Graph Operations for Mobile Authentication |
title_full_unstemmed |
Privacy-Preserving Graph Operations for Mobile Authentication |
title_sort |
privacy-preserving graph operations for mobile authentication |
publisher |
Hindawi-Wiley |
series |
Wireless Communications and Mobile Computing |
issn |
1530-8669 1530-8677 |
publishDate |
2020-01-01 |
description |
Along with the fast development of wireless technologies, smart devices have become an integral part of our daily life. Authentication is one of the most common and effective methods for these smart devices to prevent unauthorized access. Moreover, smart devices tend to have limited computing power, and they may possess sensitive data. In this paper, we investigate performing graph operations in a privacy-preserving manner, which can be used for anonymous authentication for smart devices. We propose two protocols that allow two parties to jointly compute the intersection and union of their private graphs. Our protocols utilize homomorphic encryption to prevent information leakage during the process, and we provide security proofs of the protocols in the semihonest setting. At last, we implement and evaluate the efficiency of our protocols through experiments on real-world graph data. |
url |
http://dx.doi.org/10.1155/2020/8859213 |
work_keys_str_mv |
AT pengli privacypreservinggraphoperationsformobileauthentication AT fucaizhou privacypreservinggraphoperationsformobileauthentication AT zifengxu privacypreservinggraphoperationsformobileauthentication AT yuxili privacypreservinggraphoperationsformobileauthentication AT jianxu privacypreservinggraphoperationsformobileauthentication |
_version_ |
1715013406659969024 |