From: Location-sharing protocol for privacy protection in mobile online social networks
Protocol | Cellular towers | Broadcast encryption | The number of \(S_{LS}\) | Authorized access | Identity privacy | Social relation privacy | Location privacy | Activity track privacy | Identity authentication |
---|---|---|---|---|---|---|---|---|---|
Nan Shen [21] | Yes | No | 1 | Yes | No | Yes | Yes | Yes | No |
Jin Li [28] | No | Yes | n | Yes | Yes | Yes | Yes | No | Yes |
Xi Xiao [30] | Yes | No | 1 | Yes | No | Yes | Yes | Yes | No |
Juan Chen [22] | No | No | 1 | Yes | Yes | Yes | Yes | Yes | Yes |
Chang Xu [29] | No | No | n | Yes | Yes | Yes | Yes | Yes | Yes |
Our protocol | No | No | 1 | Yes | Yes | Yes | Yes | Yes | Yes |