Improved Cloud-Assisted Privacy-Preserving Profile-Matching Scheme in Mobile Social Networks
Algorithm 1
Data outsourcing.
Input: A user Bob wants to outsource his personal profile to CA and holds a private vector .
Output: The encrypted result , and are sent to CA.
(1)
CA executes KeyGen algorithm of the improved HRES algorithm with CB to generate their respective key pairs and their Diffie–Hellman key . Thereafter, is issued to the users in social networks.
(2)
Firstly, Bob normalizes his vector with Z-score method and then converts each element of the normalized vector to an integer by multiplying it with a pretreatment public integer and ceiling. Finally, Bob gets his matching vector and calculates ,.
(3)
Bob negotiates with the CA to run the Diffie–Hellman key exchange protocol to generate a secret random integer .
(4)
After encrypting the following values: ,, and , Bob uploads these encrypted values to CA.