Research Article
An Authenticated Privacy-Preserving Mobile Matchmaking Protocol Based on Social Connections with Friendship Ownership
| Notation | Meaning |
| | Public key of user | | Private key of user | | Identity of user | | A fixed sufficient long string chosen by user | | Cryptographic hash functions | | Signature of signed using private key | | True, if is a valid signature of message verified using public key ; else false | | | | | | | | is the friend of user | | and | | or | | and | | | | | | | | | | Encrypt using public key | | Decrypt using private key | | Encrypt using symmetric key | | Decrypt using symmetric key | | | | and | | Friendship certificate list of user | | True, if ; false, else | Where sets sets . |
|
|