Skip to main content

Table 3 Comparison of performances with other related protocols

From: Location-sharing protocol for privacy protection in mobile online social networks

Protocol

Cellular towers

Broadcast encryption

The number of \(S_{LS}\)

Authorized access

Identity privacy

Social relation privacy

Location privacy

Activity track privacy

Identity authentication

Nan Shen [21]

Yes

No

1

Yes

No

Yes

Yes

Yes

No

Jin Li [28]

No

Yes

n

Yes

Yes

Yes

Yes

No

Yes

Xi Xiao [30]

Yes

No

1

Yes

No

Yes

Yes

Yes

No

Juan Chen [22]

No

No

1

Yes

Yes

Yes

Yes

Yes

Yes

Chang Xu [29]

No

No

n

Yes

Yes

Yes

Yes

Yes

Yes

Our protocol

No

No

1

Yes

Yes

Yes

Yes

Yes

Yes