Secure Judgment of Point and Line Relationship Against Malicious Adversaries and Its Applications

被引:3
|
作者
Liu, Xin [1 ,2 ]
Xu, Yang [1 ]
Xu, Gang [3 ]
Chen, Xiu-Bo [4 ]
Chen, Yu -Ling [5 ]
机构
[1] Inner Mongolia Univ Sci & Technol, Sch Informat Engn, Baotou, Peoples R China
[2] Shaanxi Normal Univ, Comp Coll, Xian, Peoples R China
[3] North China Univ Technol, Sch Informat Sci & Technol, Beijing, Peoples R China
[4] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing, Peoples R China
[5] Guizhou Univ, Coll Comp Sci & Technol, Guiyang, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2022年 / 23卷 / 05期
关键词
Secure multi-party computation; Point and line relationship; Malicious model; Real; ideal model paradigm; MULTIPARTY; COMMUNICATION; EFFICIENT;
D O I
10.53106/160792642022092305010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of the Internet and information technology, the problem of zero-trust networks has become increasingly prominent, and secure multi-party computation has become a research hotspot to solve the problem of zero-trust networks. The secure judgment of point and line relationship is an important research branch of secure computing set geometry. However, most of resent secure computing protocols of point and line relationship are designed in the semi-honest model and cannot resist malicious attacks. Therefore, this paper analyzes the possible malicious adversary behaviors and designs a secure protocol in the knowledge proof, and cut-choose method are used to resist efficient and widely used in real applications.
引用
收藏
页码:1019 / 1027
页数:9
相关论文
共 19 条
  • [1] The secure judgment of graphic similarity against malicious adversaries and its applications
    Liu, Xin
    Xu, Yang
    Luo, Dan
    Xu, Gang
    Xiong, Neal
    Chen, Xiu-Bo
    SCIENTIFIC REPORTS, 2023, 13 (01):
  • [2] The secure judgment of graphic similarity against malicious adversaries and its applications
    Xin Liu
    Yang Xu
    Dan Luo
    Gang Xu
    Neal Xiong
    Xiu-Bo Chen
    Scientific Reports, 13 (1)
  • [3] Confidentially judging the relationship between an integer and an interval against malicious adversaries and its applications
    Liu, Xin
    Zhang, Ruiling
    Xu, Gang
    Chen, Xiu-Bo
    Xiong, Neal N.
    COMPUTER COMMUNICATIONS, 2021, 180 : 115 - 125
  • [4] A Secure Scalar Product Protocol Against Malicious Adversaries
    Bo Yang
    Yong Yu
    Chung-Huang Yang
    Journal of Computer Science and Technology, 2013, 28 : 152 - 158
  • [5] A Secure Scalar Product Protocol Against Malicious Adversaries
    杨波
    禹勇
    杨中皇
    Journal of Computer Science & Technology, 2013, 28 (01) : 152 - 158
  • [6] A Secure Scalar Product Protocol Against Malicious Adversaries
    Yang, Bo
    Yu, Yong
    Yang, Chung-Huang
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2013, 28 (01) : 152 - 158
  • [7] Secure blockchain bidding auction protocol against malicious adversaries
    Dai, Xiaobing
    Liu, Jiajing
    Liu, Xin
    Tu, Xiaofen
    Wang, Ruexue
    HIGH-CONFIDENCE COMPUTING, 2024, 4 (03):
  • [8] Malicious adversaries against secure state estimation: Sparse sensor attack design
    Lu, An-Yang
    Yang, Guang-Hong
    AUTOMATICA, 2022, 136
  • [9] POOL: Scalable On-Demand Secure Computation Service Against Malicious Adversaries
    Zhu, Ruiyu
    Huang, Yan
    Cassel, Darion
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 245 - 257
  • [10] A GMM-Based Secure State Estimation Approach against Dynamic Malicious Adversaries
    Zhu, Cui
    Wang, Zile
    Zang, Zeyuan
    Li, Yuxuan
    Zheng, Huanming
    JOURNAL OF SENSORS, 2022, 2022