Privacy-preserving two-party computation of line segment intersection

被引:0
|
作者
Sheidani, Sorour [1 ]
Zarei, Alireza [1 ]
机构
[1] Sharif Univ Technol, Dept Math Sci, Tehran, Iran
关键词
Segment intersection; Multi-party computation; Passive adversary; Private segment intersection; Secure computational geometry; SECURE MULTIPARTY COMPUTATION;
D O I
10.1007/s10207-024-00895-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
By considering maps and routes as sequences of line segments, their intersections can be computed to find out useful information like the possibility of collision in a military area where the parties do not trust each other. At the first glance, finding the coordinates of the intersections is seemed impossible to be solved securely since having coordinates of two intersection points on the same line reveals the passing line. In this paper, we solve this problem by suggesting a secure two-party protocol in presence of passive adversaries. Additionally, regarding the fact that in some cases, the fixedness of the inputs of the parties in classic security models is an unrealistic assumption, we define the new concept of input-adaptive security and show that our method is secure against such an adversary who is able to select his inputs adaptively. In addition to serve different approaches like oblivious transfer and sometimes homomorphic encryption, we also employ some tricks to prevent the distribution of harmful information between specific parties to achieve our intended security level. We provide formal proofs to show the security of our protocol. Time complexity analysis and implementations show that our protocol finds the intersections in feasible time of O(nlogn)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathcal {O}}(n \log n)$$\end{document} and indicate that our protocol is as good as the unsecure optimal method of line segment intersection computation. In comparison, previous methods require O(n2)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$O(n<^>2)$$\end{document} to only detect the existence of intersection between two sets of n line segments and are unable to find the coordinates of the intersections.
引用
收藏
页码:3415 / 3432
页数:18
相关论文
共 50 条
  • [1] Privacy-Preserving Quantum Two-Party Geometric Intersection
    Liu, Wenjie
    Xu, Yong
    Yang, James C. N.
    Yu, Wenbin
    Chi, Lianhua
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 60 (03): : 1237 - 1250
  • [2] Two-Party Privacy-Preserving Set Intersection with FHE
    Cai, Yunlu
    Tang, Chunming
    Xu, Qiuxia
    ENTROPY, 2020, 22 (12) : 1 - 15
  • [3] Privacy-preserving Two-party Rational Set Intersection Protocol
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2012, 36 (03): : 277 - 286
  • [4] Privacy-preserving two-party rational set intersection protocol
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    Informatica (Slovenia), 2012, 36 (03): : 277 - 286
  • [6] Application of Secure Two-Party Computation in a Privacy-Preserving Android App
    De Vincenzi, Marco
    Martinelli, Fabio
    Matteucci, Ilaria
    Sebastio, Stefano
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [7] Privacy-preserving Naive Bayes classification based on secure two-party computation
    Liu, Kun
    Tang, Chunming
    AIMS MATHEMATICS, 2023, 8 (12): : 28517 - 28539
  • [8] Practical Privacy-Preserving Indoor Localization Based on Secure Two-Party Computation
    Nieminen, Raine
    Jarvinen, Kimmo
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2021, 20 (09) : 2877 - 2890
  • [9] Privacy-Preserving Edit Distance Computation Using Secret-Sharing Two-Party Computation
    Vanegas, Hernan
    Cabarcas, Daniel
    Aranha, Diego F.
    PROGRESS IN CRYPTOLOGY, LATINCRYPT 2023, 2023, 14168 : 67 - 86
  • [10] Privacy Preserving Two-Party Rational Set Computation
    Dou J.-W.
    Liu X.-H.
    Wang W.-L.
    Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (08): : 1397 - 1413