A privacy-preserving triangle inequality determination protocol and its applications

被引:0
|
作者
Luo, Shou-Shan [1 ,2 ,3 ]
Liao, Gan-Cai [1 ,2 ,3 ]
Liu, Wen [1 ,2 ,3 ]
机构
[1] State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
[2] Key Laboratory of Network and Information Attack and Defence Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
[3] National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
In triangle determination, if the side information is confidential to others, and provided by different users, it is the privacy-preserving triangle shape determination problem without solution by traditional method. By using scalar product protocol, a privacy-preserving triangle inequality determination protocol based on semi-honest is proposed, and the correctness, security and complexity are analyzed. The solution to privacy-preserving triangle shape determination problem and privacy-preserving vector comparison problem are proposed.
引用
收藏
页码:47 / 51
相关论文
共 50 条
  • [31] Privacy-Preserving Approximate Convex Hulls Protocol
    Zhu, Youwen
    Huang, Liusheng
    Yang, Wei
    Li, Dong
    Li, Lingjun
    Luo, Yonglong
    Dong, Fan
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 208 - 214
  • [32] Protocol for Privacy-Preserving Set Pattern Matching
    Zheng Qiang
    Luo Shou-shan
    Xin Yang
    Yang Yi-xian
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 168 - 172
  • [33] Privacy-Preserving Authentication Protocol for Wireless Body Area Networks in Healthcare Applications
    Ryu, Hyunho
    Kim, Hyunsung
    HEALTHCARE, 2021, 9 (09)
  • [34] Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests
    Morita, Hiraku
    Attrapadung, Nuttapong
    Ohata, Satsuya
    Nuida, Koji
    Yamada, Shota
    Shimizu, Kana
    Hanaoka, Goichiro
    Asai, Kiyoshi
    PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 530 - 534
  • [35] A security protocol for scalable and privacy-preserving Car-to-X eSafety applications
    Weyl, Benjamin
    Tornesello, Sebastiano
    Voegel, Hans-Joerg
    Kosch, Timo
    Eckert, Claudia
    AUTOMOTIVE SECURITY, 2007, 2016 : 71 - 91
  • [36] Three New Approaches to Privacy-preserving Add to Multiply Protocol and Its Application
    Zhu, Youwen
    Huang, Liusheng
    Yang, Wei
    Li, Dong
    Luo, Yonglong
    Dong, Fan
    WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 554 - 558
  • [37] One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
    Wang, Xiaofen
    Mu, Yi
    Chen, Rongmao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) : 1723 - 1732
  • [38] CRYPTOGRAPHIC ALGORITHMS FOR PRIVACY-PRESERVING ONLINE APPLICATIONS
    Li, Ruinian
    Xiao, Yinhao
    Zhang, Cheng
    Song, Tianyi
    Hu, Chunqiang
    MATHEMATICAL FOUNDATIONS OF COMPUTING, 2018, 1 (04): : 311 - 330
  • [39] On the Fairness of Privacy-Preserving Representations in Medical Applications
    Sarhan, Mhd Hasan
    Navab, Nassir
    Eslami, Abouzar
    Albarqouni, Shadi
    DOMAIN ADAPTATION AND REPRESENTATION TRANSFER, AND DISTRIBUTED AND COLLABORATIVE LEARNING, DART 2020, DCL 2020, 2020, 12444 : 140 - 149
  • [40] Privacy-preserving federated learning for radiotherapy applications
    Hayati, H.
    Heijmans, S.
    Persoon, L.
    Murguia, C.
    van de Wouw, N.
    RADIOTHERAPY AND ONCOLOGY, 2023, 182 : S238 - S240