Privacy-preserving cross product protocol and its applications

被引:0
|
作者
Luo, Yong-Long [1 ,2 ]
Huang, Liu-Sheng [1 ,2 ]
Jing, Wei-Wei [1 ,2 ]
Xu, Wei-Jiang [1 ,2 ]
Chen, Guo-Liang [1 ,2 ]
机构
[1] Department of Computer Science and Technology, University of Science and Technology of China, Hefei 230027, China
[2] Anhui Province Key Laboratory of Software in Computing and Communication, Hefei 230027, China
来源
关键词
Cross product - Line segment method - Private data - Secure multiparty computation (SMC) - Secure protocol - Semi honest model;
D O I
暂无
中图分类号
学科分类号
摘要
In computational geometry, computing cross products is at the heart of line-segment methods. If the points and the line segments of the cross product algorithms are of several users and the privacy of any user is not considered, the problem can be solved through traditional methods, because we can assume the existence of a user who knows inputs from all the users. However, the traditional methods or simply improved methods aren't fit for the situation where no user is willing to disclose his private data to other users and some new methods should be developed to solve the new problem. In this paper, privacy-preserving point-segment cross product protocol is firstly presented under the semi-honest model and its security and correctness are also discussed. Privacy-preserving cross product protocol can be used to solve many privacy-preserving computational geometry problems. As an example, a secure protocol for determining whether two line-segments intersect is developed based on the privacy-preserving point-segment cross product protocol.
引用
收藏
页码:248 / 254
相关论文
共 50 条
  • [1] Efficient scalar product protocol and its privacy-preserving application
    Zhu, Youwen
    Takagi, Tsuyoshi
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2015, 7 (01) : 1 - 19
  • [2] A privacy-preserving triangle inequality determination protocol and its applications
    Luo, Shou-Shan
    Liao, Gan-Cai
    Liu, Wen
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2009, 32 (01): : 47 - 51
  • [3] Experimental analysis of a privacy-preserving scalar product protocol
    Yang, ZQ
    Wright, RN
    Subramaniam, H
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2006, 21 (01): : 47 - 52
  • [4] A new efficient privacy-preserving scalar product protocol
    Amirbekyan, Artak
    Estivill-Castro, Vladimir
    Conferences in Research and Practice in Information Technology Series, 2007, 70 : 209 - 214
  • [5] A NEW PRIVACY-PRESERVING EUCLID-DISTANCE PROTOCOL AND ITS APPLICATIONS IN WSNS
    Chen Ping
    Ji Yimu
    Wang Ruchuan
    Huang Haiping
    Zhang Dan
    Journal of Electronics(China), 2013, 30 (02) : 190 - 197
  • [6] Privacy-preserving point-line relation determination protocol and its applications
    School of Computer Science and Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    不详
    Beijing Youdian Daxue Xuebao, 2008, 2 (72-75):
  • [7] Privacy-preserving distance measurement and its applications
    Luo, YL
    Huang, LS
    Chen, GL
    Shen, H
    CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (02): : 237 - 241
  • [8] A Privacy-Preserving Comparison Protocol
    Sutradhar, Kartick
    Om, Hari
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (06) : 1815 - 1821
  • [9] Privacy-Preserving Wildcards Pattern Matching Protocol for IoT Applications
    Qin, Hong
    Wang, Hao
    Wei, Xiaochao
    Xue, Likun
    Wu, Lei
    IEEE ACCESS, 2019, 7 : 36094 - 36102
  • [10] Privacy-preserving matrix rank computation and its applications
    Yao Yifei
    Huang Liusheng
    Luo Yonglong
    Xu Weijiang
    Jing Weiwei
    CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (03): : 481 - 486