Skip to main content

Table 3 Comparison of performances with other related protocols

From: Location-sharing protocol for privacy protection in mobile online social networks

Protocol Cellular towers Broadcast encryption The number of \(S_{LS}\) Authorized access Identity privacy Social relation privacy Location privacy Activity track privacy Identity authentication
Nan Shen [21] Yes No 1 Yes No Yes Yes Yes No
Jin Li [28] No Yes n Yes Yes Yes Yes No Yes
Xi Xiao [30] Yes No 1 Yes No Yes Yes Yes No
Juan Chen [22] No No 1 Yes Yes Yes Yes Yes Yes
Chang Xu [29] No No n Yes Yes Yes Yes Yes Yes
Our protocol No No 1 Yes Yes Yes Yes Yes Yes