Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2015, Article ID 637458, 8 pages
Research Article

Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks

1School of Computer Science and Technology, Shandong University, Jinan 250101, China
2School of Information and Electrical Engineering, Ludong University, Yantai 264025, China
3School of Information Science and Engineering, Shandong Normal University, Jinan 250014, China
4School of Computer Science, Shaanxi Normal University, Xi’an 710062, China
5Laboratory of Algorithmics, Cryptology and Security (LACS), 1359 Luxembourg, Luxembourg

Received 29 August 2014; Accepted 1 September 2014

Academic Editor: David Taniar

Copyright © 2015 Yilei Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


With the rapid development of mobile devices and wireless technologies, mobile social networks become increasingly available. People can implement many applications on the basis of mobile social networks. Secure computation, like exchanging information and file sharing, is one of such applications. Fairness in secure computation, which means that either all parties implement the application or none of them does, is deemed as an impossible task in traditional secure computation without mobile social networks. Here we regard the applications in mobile social networks as specific functions and stress on the achievement of fairness on these functions within mobile social networks in the presence of two rational parties. Rational parties value their utilities when they participate in secure computation protocol in mobile social networks. Therefore, we introduce reputation derived from mobile social networks into the utility definition such that rational parties have incentives to implement the applications for a higher utility. To the best of our knowledge, the protocol is the first fair secure computation in mobile social networks. Furthermore, it finishes within constant rounds and allows both parties to know the terminal round.