A new Lagrange solution to the privacy-preserving general geometric intersection problem

被引:6
|
作者
Qin, Jing [1 ]
Duan, Hongwei [1 ,2 ]
Zhao, Huawei [3 ]
Hu, Jiankun [1 ,4 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Peoples R China
[2] Haidian Teachers Training Coll, Expt Sch, Beijing, Peoples R China
[3] Shandong Univ Finance & Econ, Sch Comp & Informat Engn, Jinan, Peoples R China
[4] Univ New S Wales, Sch Engn & Informat Technol, Canberra, ACT, Australia
基金
中国国家自然科学基金;
关键词
Intersection problem; Judging private path problem; Privacy-preserving computational geometry; Lagrange multiplier method; Security;
D O I
10.1016/j.jnca.2014.08.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Secure multi-party computation (SMC) is an important problem in cryptography. Existing solutions are mostly based on circuit evaluation protocols which are impractical. In this paper, a solution is proposed by abstracting the intersection problem and the judging private path problem into a general intersection problem, i.e., if two participants have a private curve and do not disclose their private curve data, how to solve two-free-plane-curve intersection problem in a cooperative environment. A systematic Lagrange multiplier method is proposed to combat the general intersection problem instead of focusing on normal curves case. The proposed systematic method can systematically deal with various intersection problems faced in practical applications. In addition, the proposed method can also solve the normal curves cases. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:94 / 99
页数:6
相关论文
共 50 条
  • [41] SEPSI: A Secure and Efficient Privacy-Preserving Set Intersection with Identity Authentication in IoT
    Liu, Bai
    Zhang, Xiangyi
    Shi, Runhua
    Zhang, Mingwu
    Zhang, Guoxing
    MATHEMATICS, 2022, 10 (12)
  • [42] Using private set intersection to achieve privacy-preserving authorization for IoT systems
    Cai, Rongsheng
    Chen, Lanxiang
    Zhu, Yizhao
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83
  • [43] A New Privacy-Preserving Solution for Clustering Massively Distributed Personal Times-Series
    Allard, Tristan
    Hebrail, Georges
    Masseglia, Florent
    Pacitti, Esther
    2016 32ND IEEE INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2016, : 1370 - 1373
  • [44] Privacy-Preserving Verifiable Graph Intersection Scheme With Cryptographic Accumulators in Social Networks
    Zuo, Xiangjian
    Li, Lixiang
    Luo, Shoushan
    Peng, Haipeng
    Yang, Yixian
    Gong, Linming
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) : 4590 - 4603
  • [45] Privacy-Preserving Integration of Medical Data: A Practical Multiparty Private Set Intersection
    Miyaji A.
    Nakasho K.
    Nishida S.
    Journal of Medical Systems, 2017, 41 (3)
  • [46] A Distributed Privacy-Preserving Learning Dynamics in General Social Networks
    Tao, Youming
    Chen, Shuzhen
    Li, Feng
    Yu, Dongxiao
    Yu, Jiguo
    Sheng, Hao
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (09) : 9547 - 9561
  • [47] Privacy-preserving authentication for general directed graphs in industrial IoT
    Zhu, Fei
    Wu, Wei
    Zhang, Yuexin
    Chen, Xiaofeng
    INFORMATION SCIENCES, 2019, 502 : 218 - 228
  • [48] PPGJ: A privacy-preserving general join for outsourced encrypted database
    Ma, Sha
    Yang, Bo
    Zhang, Mingwu
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (08) : 1232 - 1244
  • [49] A General Privacy-Preserving Auction Mechanism for Secondary Spectrum Markets
    Huang, Qianyi
    Gui, Yang
    Wu, Fan
    Chen, Guihai
    Zhang, Qian
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (03) : 1881 - 1893
  • [50] RESEARCH ON PRIVACY-PRESERVING PROBLEM FOR DATA-SHARING IN IDS
    Wang, Wenbin
    Sun, Qibo
    Yan, Danfeng
    CIICT 2008: PROCEEDINGS OF CHINA-IRELAND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGIES 2008, 2008, : 320 - 323