期刊文献+

社交网络:基于共同爱好的匿名交友

Social Network: Anonimous Friend-Making based on Common Interests
原文传递
导出
摘要 通过共同兴趣爱好点实现陌生朋友之间的发现与交友,针对陌生朋友发现问题中用户ID的隐私问题,提出通过构造用户的临时身份标识符TID来代替真实身份ID,即用户的真实身份ID被隐藏,而使用TID进行陌生朋友之间的传输与计算。该方案实现了陌生朋友之间的兴趣爱好匹配和信息互换,在此过程中加解密和数字签名Sig保证消息的完整性,TID保证ID的隐蔽性,从而使安全性得到了保障。结果表明,该方案具有较好的安全性。 The friend discovery and making could be realized on the basis of common interests, and aiming at privacy problem of user's ID during the process of strange friend discovery, a new scheme is proposed, that is, through constructing the user's temporary identity TID for replacing the user's true identity ID, thus the true identity of the user is hidden while TID used to transfer and compute among between the strange friends. The proposed scheme could realize interests matching and information exchange among between the strange friends. Encryption/decryption plus digital signature Sig could ensure the message integrity while TID the ID's concealment, thus the security is protected. The experiment results show that this scheme performs well in security assurance.
作者 魏文佳
出处 《信息安全与通信保密》 2013年第6期84-86,共3页 Information Security and Communications Privacy
关键词 社交网络 ID匿名 朋友交友 social network ID anonymous friend making
  • 相关文献

参考文献8

二级参考文献30

  • 1朱建明,马建峰.一种高效的具有用户匿名性的无线认证协议[J].通信学报,2004,25(6):12-18. 被引量:13
  • 2张雁,林英,郝林.构建安全椭圆曲线密码体制的关键问题[J].计算机应用,2004,24(B12):82-84. 被引量:6
  • 3杨浩淼,江春华.产生安全椭圆曲线的MPI并行实现[J].成都信息工程学院学报,2005,20(2):138-141. 被引量:1
  • 4Ikavaka D. How do Computer Hackers "Get Inside" a Computer[J]. Scientif American, 2005, 292(01): 104-105.
  • 5[1]Stallings W.Network Security Essentials,3e网络安全基础:应用与标准[M].第3版.北京:清华大学出版社,2007.
  • 6WONG D S.Security analysis of two anonymous authentication protocols for distributed wireless networks[A].Proc of the 3rd IEEE Intl Conf on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops)[C].2005.284-288.
  • 7HIROSE S,YOSHIDA S.A user authentication scheme with identity and location Privacy[A].ACISP 2001[C].2001.235-246.
  • 8PARK J,GO J,KIM K.Wireless authentication protocol preserving user anonymity[A].Proc of the 2001 Symposium on Cryptography and Information Security (SCIS 2001)[C].Japan,2001.23-26.
  • 9KANG M H,RYOU H B,CHOI W.Design of anonymity-preserving user authentication and key agreement protocol for ubiquitous computing environments[A].WINE 2005[C].2005.491-499.
  • 10KIM W H,YOON E J,YOO K Y.New authentication protocol providing user anonymity in open network[A].WINE 2005[C].2005.414-423.

共引文献117

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部