A privacy-preserving triangle inequality determination protocol and its applications

被引:0
|
作者
Luo, Shou-Shan [1 ,2 ,3 ]
Liao, Gan-Cai [1 ,2 ,3 ]
Liu, Wen [1 ,2 ,3 ]
机构
[1] State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
[2] Key Laboratory of Network and Information Attack and Defence Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
[3] National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
In triangle determination, if the side information is confidential to others, and provided by different users, it is the privacy-preserving triangle shape determination problem without solution by traditional method. By using scalar product protocol, a privacy-preserving triangle inequality determination protocol based on semi-honest is proposed, and the correctness, security and complexity are analyzed. The solution to privacy-preserving triangle shape determination problem and privacy-preserving vector comparison problem are proposed.
引用
收藏
页码:47 / 51
相关论文
共 50 条
  • [1] Privacy-preserving point-line relation determination protocol and its applications
    School of Computer Science and Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    不详
    Beijing Youdian Daxue Xuebao, 2008, 2 (72-75):
  • [2] Privacy-preserving cross product protocol and its applications
    Luo, Yong-Long
    Huang, Liu-Sheng
    Jing, Wei-Wei
    Xu, Wei-Jiang
    Chen, Guo-Liang
    Jisuanji Xuebao/Chinese Journal of Computers, 2007, 30 (02): : 248 - 254
  • [3] A NEW PRIVACY-PRESERVING EUCLID-DISTANCE PROTOCOL AND ITS APPLICATIONS IN WSNS
    Chen Ping
    Ji Yimu
    Wang Ruchuan
    Huang Haiping
    Zhang Dan
    Journal of Electronics(China), 2013, 30 (02) : 190 - 197
  • [4] Privacy-preserving distance measurement and its applications
    Luo, YL
    Huang, LS
    Chen, GL
    Shen, H
    CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (02): : 237 - 241
  • [5] A Privacy-Preserving Comparison Protocol
    Sutradhar, Kartick
    Om, Hari
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (06) : 1815 - 1821
  • [6] Privacy-preserving Triangle Counting in Distributed Graphs
    Do, Hoang Giang
    Ng, Wee Keong
    IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS IEEE AINA 2016, 2016, : 917 - 924
  • [7] Privacy-Preserving Triangle Counting in Large Graphs
    Ding, Xiaofeng
    Zhang, Xiaodong
    Bao, Zhifeng
    Jin, Hai
    CIKM'18: PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2018, : 1283 - 1292
  • [8] Privacy-Preserving Wildcards Pattern Matching Protocol for IoT Applications
    Qin, Hong
    Wang, Hao
    Wei, Xiaochao
    Xue, Likun
    Wu, Lei
    IEEE ACCESS, 2019, 7 : 36094 - 36102
  • [9] Protocol for privacy-preserving intersect-determination of two polygons
    Luo, Yong-Long
    Huang, Liu-Sheng
    Xu, Wei-Jiang
    Jing, Wei-Wei
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2007, 35 (04): : 685 - 691
  • [10] Privacy-preserving matrix rank computation and its applications
    Yao Yifei
    Huang Liusheng
    Luo Yonglong
    Xu Weijiang
    Jing Weiwei
    CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (03): : 481 - 486