Privacy-Preserving Graph Operations for Mobile Authentication

Along with the fast development of wireless technologies, smart devices have become an integral part of our daily life. Authentication is one of the most common and effective methods for these smart devices to prevent unauthorized access. Moreover, smart devices tend to have limited computing power,...

Full description

Bibliographic Details
Main Authors: Peng Li, Fucai Zhou, Zifeng Xu, Yuxi Li, Jian Xu
Format: Article
Language:English
Published: Hindawi-Wiley 2020-01-01
Series:Wireless Communications and Mobile Computing
Online Access:http://dx.doi.org/10.1155/2020/8859213
id doaj-bc6dd6a5069241d9b35a522fd91270a3
record_format Article
spelling doaj-bc6dd6a5069241d9b35a522fd91270a32020-12-07T09:08:24ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772020-01-01202010.1155/2020/88592138859213Privacy-Preserving Graph Operations for Mobile AuthenticationPeng Li0Fucai Zhou1Zifeng Xu2Yuxi Li3Jian Xu4Software College, Northeastern University, Shenyang, ChinaSoftware College, Northeastern University, Shenyang, ChinaSoftware College, Northeastern University, Shenyang, ChinaSoftware College, Northeastern University, Shenyang, ChinaSoftware College, Northeastern University, Shenyang, ChinaAlong with the fast development of wireless technologies, smart devices have become an integral part of our daily life. Authentication is one of the most common and effective methods for these smart devices to prevent unauthorized access. Moreover, smart devices tend to have limited computing power, and they may possess sensitive data. In this paper, we investigate performing graph operations in a privacy-preserving manner, which can be used for anonymous authentication for smart devices. We propose two protocols that allow two parties to jointly compute the intersection and union of their private graphs. Our protocols utilize homomorphic encryption to prevent information leakage during the process, and we provide security proofs of the protocols in the semihonest setting. At last, we implement and evaluate the efficiency of our protocols through experiments on real-world graph data.http://dx.doi.org/10.1155/2020/8859213
collection DOAJ
language English
format Article
sources DOAJ
author Peng Li
Fucai Zhou
Zifeng Xu
Yuxi Li
Jian Xu
spellingShingle Peng Li
Fucai Zhou
Zifeng Xu
Yuxi Li
Jian Xu
Privacy-Preserving Graph Operations for Mobile Authentication
Wireless Communications and Mobile Computing
author_facet Peng Li
Fucai Zhou
Zifeng Xu
Yuxi Li
Jian Xu
author_sort Peng Li
title Privacy-Preserving Graph Operations for Mobile Authentication
title_short Privacy-Preserving Graph Operations for Mobile Authentication
title_full Privacy-Preserving Graph Operations for Mobile Authentication
title_fullStr Privacy-Preserving Graph Operations for Mobile Authentication
title_full_unstemmed Privacy-Preserving Graph Operations for Mobile Authentication
title_sort privacy-preserving graph operations for mobile authentication
publisher Hindawi-Wiley
series Wireless Communications and Mobile Computing
issn 1530-8669
1530-8677
publishDate 2020-01-01
description Along with the fast development of wireless technologies, smart devices have become an integral part of our daily life. Authentication is one of the most common and effective methods for these smart devices to prevent unauthorized access. Moreover, smart devices tend to have limited computing power, and they may possess sensitive data. In this paper, we investigate performing graph operations in a privacy-preserving manner, which can be used for anonymous authentication for smart devices. We propose two protocols that allow two parties to jointly compute the intersection and union of their private graphs. Our protocols utilize homomorphic encryption to prevent information leakage during the process, and we provide security proofs of the protocols in the semihonest setting. At last, we implement and evaluate the efficiency of our protocols through experiments on real-world graph data.
url http://dx.doi.org/10.1155/2020/8859213
work_keys_str_mv AT pengli privacypreservinggraphoperationsformobileauthentication
AT fucaizhou privacypreservinggraphoperationsformobileauthentication
AT zifengxu privacypreservinggraphoperationsformobileauthentication
AT yuxili privacypreservinggraphoperationsformobileauthentication
AT jianxu privacypreservinggraphoperationsformobileauthentication
_version_ 1715013406659969024