[1] Mokbel M F.Privacy in location-based services:State-of-the-art and research directions[C]//2007 International Conference on Mobile Data Management.Mannheim,Germany:IEEE,2007:228-228. [2]Zheng Kai,Shang Shuo,Yuan N J,et al.Towards efficient search for activity trajectories[C]//Proceedings of the 29th IEEE International Conference on Data Engineering.Brisbane,Australia:IEEE,2013:230-241. [3]Abowd G D,Atkeson C G,Hong J,et al.CyberGuide:A mobile context-aware tour guide[J].Wireless Networks,1997,3(5):421-433. [4]NextBus Inc.NextBus[EB/OL].http://www.nextbus.com,2015-03-30. [5]Gruteser M,Grunwald D.Anonymous usage of location-based services through spatial and temporal cloaking[C]//Proceeding of the 1st International Conference on Mobile Systems,Applications and Services(MobiSys'03).New York,USA:ACM,2003:31-42. [6]Kido H,Yanagisaway Y,Satoh T.An anonymous communication technique using dummies for location-based services[C]//Proceeding of International Conference on Pervasive Services 2005(ICPS'05).Munich,Germany:IEEE,2005:88-97. [7]Yiu M L,Jensen C S,Huang Xuegang,et al.Spacetwist:Managing the trade-offs among location privacy,query performance,and query accuracy in mobile services[C]//IEEE 24th International Conference on Data Engineering(ICDE 2008).Cancun,Mexico:IEEE,2008:366-375. [8]Khoshgozaran A,Shahabi C.Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy[C]//Proceedings of the 10th International Conference on Advances in Spatial and Temporal Databases(SSTD'07).Boston,MA,USA:Springer-Verlag Berlin,Heidelberg,2007:239-257. [9]Kalnis P,Ghinita G,Mouratidis K A.Preventing location-based identity inference in anonymous spatial queries[J].IEEE Transactions on Knowledge and Data Engineering,2007,19(12):1719-1733. [10]Gedik B,Liu Ling.Protecting location privacy with personalized k-anonymity:Architecture and algorithms[J].IEEE Transactions on Mobile Computing,2008,7(1):1-18. [11]Xu Jianliang,Tang Xueyan,Hu Haibo,et al.Privacy-conscious location-based queries in mobile environments[J].IEEE Transactions on Parallel and Distributed Systems,2009,21(3):313-326. [12]Solanas A,Martínez-Ballesté A.Privacy protection in location-based services through a public-key privacy homomorphism[J].Public Key Infrastructure,2007,4582:362-368. [13]Solanas A,Martínez-Ballesté A.A TTP-free protocol for location privacy in location-based services[J].Computer Communications,2008,31(6):1181-1191. [14]Zhu Xiaoling,Lu Yang,Zhu Xiaojuan,et al.A location privacy-preserving protocol based on homomorphic encryption and key agreement[C]//2013 International Conference on Information Science and Cloud Computing Companion.Guangzhou:IEEE,2013:54-59. [15]Zhu Xiaoling,Hu Donghui,Hou Zhengfeng,et al.A location privacy preserving solution to resist passive and active attacks in VANET[J].Communications,2014,11(9):60-67. [16]Krunal N C,Deshmukha H R.Mobile Ad-Hoc wireless network[J].International Journal of Computer Science and Information Technologies,2012,3(2):3782-3786. [17]Goldwasser S.Multi party computations:Past and present[C]//16th Annual ACM Symposium on Principles of Distributed Computing.New York,USA:ACM,1997:1-6. [18]Du Wenliang,Zhan Zhijun.A practical approach to solve secure multi-party computation problems[C]//Proceedings of the 2002 Workshop on New Security Paradigms(NSPW'02).New York,NY,USA:ACM,2002:127-135. [19]Yao A C.Protocols for secure computations[C]//Proceedings of the 23rd Annual Symposium on Foundations of Computer Science.Washington,DC,USA:IEEE Computer Society,1982:160-164. [20]Clifto C.Tools for privacy preserving distributed data mining[J].SIGKDD Explorations,2003,4(2):28-34. [21]Gennaro R,Micali S.Verifiable secret sharing as secure computation[J].Lecture Notes in Computer Science,2001,921:168-182. [22]Backes M,Kate A,Patra A.Computational verifiable secret sharing revisited[J].Lecture Notes in Computer Science,2011,7073:590-609. [23]Peng Kun.Efficient VSS free of computational assumption[J].Journal of Parallel and Distributed Computing,2011,71(12):1592-1597. [24]中华人民共和国国家统计局.中国统计年鉴2014[EB/OL].http://www.stats.gov.cn/tjsj/ndsj/2014/indexch.htm,2015-03-30. [25]WIKIPEADI.Lagrange polynomial[EB/OL].http://en.wikipedia.org/wiki/Lagrange_polynomial,2015-03-30.