Research Article

Privacy Protection of Social Networks Based on Classified Attribute Encryption

Algorithm 1

Generates re-encryption key.
Input: the set of leaf node attributes of the access tree
Output: new key
//Generate a new key for each leaf node
(1)if (i ∉ URL)
   exit;
(2)else
(3) take any s’ ∈ Z;
(4) for z ∈ Z, generate a new set of leaf node attributes
(5) compute new private key of leaf node;
(6) take any  ∈ Zp;
(7) calculate the re-encryption key according to the new access tree; //Generate a new key
(8) replace the new key PPK’;
(9) replace a new signature;
(10) =  //Compute new public parameters