Privacy-Preserving Graph Operations for Mobile Authentication

Peng Li, Fucai Zhou, Zifeng Xu, Yuxi Li, Jian Xu, Ding Wang
2020 Wireless Communications and Mobile Computing  
Along with the fast development of wireless technologies, smart devices have become an integral part of our daily life. Authentication is one of the most common and effective methods for these smart devices to prevent unauthorized access. Moreover, smart devices tend to have limited computing power, and they may possess sensitive data. In this paper, we investigate performing graph operations in a privacy-preserving manner, which can be used for anonymous authentication for smart devices. We
more » ... pose two protocols that allow two parties to jointly compute the intersection and union of their private graphs. Our protocols utilize homomorphic encryption to prevent information leakage during the process, and we provide security proofs of the protocols in the semihonest setting. At last, we implement and evaluate the efficiency of our protocols through experiments on real-world graph data.
doi:10.1155/2020/8859213 fatcat:qs6ms6iuizaj3b34gga6367o6y