A privacy-preserving triangle inequality determination protocol and its applications

被引:0
|
作者
Luo, Shou-Shan [1 ,2 ,3 ]
Liao, Gan-Cai [1 ,2 ,3 ]
Liu, Wen [1 ,2 ,3 ]
机构
[1] State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
[2] Key Laboratory of Network and Information Attack and Defence Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
[3] National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
In triangle determination, if the side information is confidential to others, and provided by different users, it is the privacy-preserving triangle shape determination problem without solution by traditional method. By using scalar product protocol, a privacy-preserving triangle inequality determination protocol based on semi-honest is proposed, and the correctness, security and complexity are analyzed. The solution to privacy-preserving triangle shape determination problem and privacy-preserving vector comparison problem are proposed.
引用
收藏
页码:47 / 51
相关论文
共 50 条
  • [41] Privacy-Preserving and Explainable AI in Industrial Applications
    Ogrezeanu, Iulian
    Vizitiu, Anamaria
    Ciusdel, Costin
    Puiu, Andrei
    Coman, Simona
    Boldisor, Cristian
    Itu, Alina
    Demeter, Robert
    Moldoveanu, Florin
    Suciu, Constantin
    Itu, Lucian
    APPLIED SCIENCES-BASEL, 2022, 12 (13):
  • [42] GSTS: A secure and privacy-preserving protocol for vehicular communications
    Lin, Xiaodong
    Sun, Xiaoting
    Ho, Pin-Han
    Shen, Xuemin
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2007, 56 (06) : 3442 - 3456
  • [43] A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles
    Aman, Muhammad Naveed
    Javaid, Uzair
    Sikdar, Biplab
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (02) : 1123 - 1139
  • [44] Efficient privacy-preserving decision tree classification protocol
    Ma L.
    Peng J.
    Pei Q.
    Zhu H.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (08): : 80 - 89
  • [45] Experimental analysis of a privacy-preserving scalar product protocol
    Yang, ZQ
    Wright, RN
    Subramaniam, H
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2006, 21 (01): : 47 - 52
  • [46] A Note on a Privacy-Preserving Distance-Bounding Protocol
    Aumasson, Jean-Philippe
    Mitrokotsa, Aikaterini
    Pens-Lopez, Pedro
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 78 - 92
  • [47] A new efficient privacy-preserving scalar product protocol
    Amirbekyan, Artak
    Estivill-Castro, Vladimir
    Conferences in Research and Practice in Information Technology Series, 2007, 70 : 209 - 214
  • [48] Privacy-Preserving Universal Authentication Protocol for Wireless Communications
    He, Daojing
    Bu, Jiajun
    Chan, Sammy
    Chen, Chun
    Yin, Mingjian
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (02) : 431 - 436
  • [49] Privacy-preserving quantum protocol for finding the maximum value
    Shi, Run-hua
    Li, Yi-fei
    EPJ QUANTUM TECHNOLOGY, 2022, 9 (01)
  • [50] Privacy-Preserving Subgraph Matching Protocol for Two Parties
    Xu, Zifeng
    Zhou, Fucai
    Li, Yuxi
    Xu, Jian
    Wang, Qiang
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (04) : 571 - 588