Research Article

Improved Cloud-Assisted Privacy-Preserving Profile-Matching Scheme in Mobile Social Networks

Algorithm 1

Data outsourcing.
Input: A user Bob wants to outsource his personal profile to CA and holds a private vector .
Output: The encrypted result , and are sent to CA.
(1)CA executes KeyGen algorithm of the improved HRES algorithm with CB to generate their respective key pairs and their Diffie–Hellman key . Thereafter, is issued to the users in social networks.
(2)Firstly, Bob normalizes his vector with Z-score method and then converts each element of the normalized vector to an integer by multiplying it with a pretreatment public integer and ceiling. Finally, Bob gets his matching vector and calculates , .
(3)Bob negotiates with the CA to run the Diffie–Hellman key exchange protocol to generate a secret random integer .
(4)After encrypting the following values: , , and , Bob uploads these encrypted values to CA.