five

Comparison of method effectiveness.

收藏
Figshare2025-06-04 更新2026-04-28 收录
下载链接:
https://figshare.com/articles/dataset/Comparison_of_method_effectiveness_/29241851
下载链接
链接失效反馈
官方服务:
资源简介:
To address privacy leakage risks arising from low collaborative user engagement, third-party trust deficits, and insufficient collaboration timeliness in location-based services (LBS), this paper proposes a dual-protection framework integrating blockchain technology and threshold cryptography for safeguarding location privacy. The framework employs asymmetric encryption with Shamir’s (t, n) secret sharing to encrypt user queries, distributing decryption key fragments to collaborative users while generating n anonymous service requests through location generalization strategies. A temporary private blockchain constructed using smart contracts ensures confidential data transmission, supported by a dynamic privacy parameter configuration system based on Byzantine fault tolerance. The framework implements a priority-response consensus mechanism through Token-based equity proof-of-stake, prioritizing service for users with higher Token values. To mitigate privacy breaches caused by unresponsive collaborators, a competitive incentive mechanism ensures timely information submission. Through ciphertext fragment verification algorithms and Lagrange interpolation-based key reconstruction, the framework enables secure query decryption and service matching in untrusted third-party environments, guaranteeing information security, integrity, and non-repudiation. Experimental validation using real-world datasets confirms the framework’s feasibility and operational effectiveness.
创建时间:
2025-06-04
5,000+
优质数据集
54 个
任务类型
进入经典数据集
二维码
社区交流群

面向社区/商业的数据集话题

二维码
科研交流群

面向高校/科研机构的开源数据集话题

数据驱动未来

携手共赢发展

商业合作