Certificateless Deniable Authenticated Encryption for Location-Based Privacy Protection
نویسندگان
چکیده
منابع مشابه
K-Anonymity Algorithm Using Encryption for Location Privacy Protection
In this paper, we solved a location privacy protection in location-based services (LBS) where the mobile user had to report her exact location information to an LBS provider for the purpose of obtaining her wished services. Location invisible had been well proposed and researched to defend user privacy. However, as the nature of the insecure wireless net environment the user’s location informat...
متن کاملLocation Depersonalization for Location Privacy Protection in Location-Based Services
A spatial region with K different footprints indicates that it has been visited by K different people. An adversary may be able to identify all these users, but will not know who was there at what time. This observation gives us a new direction to investigate location depersonalization in location-based services (LBSs). We propose to leverage users’ historical location samples, each being a foo...
متن کاملImproving Privacy Protection for Location Based Services
1 V. Kartheek Kumar Reddy, 2 Dr. A.P. Siva Kumar M.Tech,Ph.D 1 PG Scholar, Department of Computer Science & Engineering (Artificial Intelligence), JNTUA College of Engineering (Autonomous), Anantapuramu, AP, India 2 Assistant Professor, Department of Computer Science & Engineering, JNTUA College of Engineering (Autonomous), Anantapuramu, AP, India 1 [email protected] 2 SivaKumar.ap@g...
متن کاملRSPAE: RFID Search Protocol based on Authenticated Encryption
Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...
متن کاملProvably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption
Multi-receiver encryption allows a sender to choose a set of authorized receivers and send them a message securely and efficiently. Only one ciphertext corresponding to the message is generated regardless of the number of receivers. Thus it is practical and useful for video conferencing systems, pay-per-view channels, distance education, and so forth. In 2010, for further protecting receivers’ ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2019
ISSN: 2169-3536
DOI: 10.1109/access.2019.2931056