Privacy-preserving Judgment of the Intersection for Convex Polygons

被引:2
|
作者
Yao, Yifei [1 ]
Ning, Shurong [1 ]
Tian, Miaomiao [2 ]
Yang, Wei [2 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing, Peoples R China
[2] Natl High Performance Comp Ctr Hefei, Hefei, Anhui, Peoples R China
关键词
STC; secret comparison protocol; privacypreserving geometric computation; polygonal intersection; polygonal union;
D O I
10.4304/jcp.7.9.2224-2231
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
As the basic issues of computational geometry, intersection and union of convex polygons can solve lots of problems, such as economy and military affairs. And privacy-preserving judgment of the intersection and union for convex polygons are most popular issues for information security. Traditional method of making the polygons public does not satisfy the requirements of personal privacy. In this paper, a method to compute intersection and union of convex polygons in secure two-party computation (STC) model has been considered, both proportionate partition and unproportionate partition cases are studied. Scan line algorithm is used to figure out the geometry matter, while secret comparison protocol is used for saving the privacy, a series of protocols for this matter is proposed, which combines computational geometry and secure multi-party computation (SMC) technique to achieve the functionality of cooperation calculation without leaking so much privacy. At last, the security, complexity and applicability analysis of the protocols are also discussed.
引用
收藏
页码:2224 / 2231
页数:8
相关论文
共 50 条
  • [1] Privacy-preserving distributed set intersection
    Ye, Qingsong
    Wang, Huaxiong
    Tartary, Christophe
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1332 - +
  • [2] Privacy-Preserving Convex Factorization Machine
    Sun, Jie
    Li, Qi
    Jiang, Yong
    2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,
  • [3] Privacy-preserving Practical Convex Hulls Protocol
    Zhu, Youwen
    Huang, Liusheng
    Yang, Wei
    Chen, Zhili
    Li, Lingjun
    Yu, Zhenshan
    Luo, Yonglong
    FCST: 2008 JAPAN-CHINA JOINT WORKSHOP ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2008, : 10 - 16
  • [4] Privacy-preserving protocols for finding the convex hulls
    Wang Qi
    Luo Yonglong
    Huang Liusheng
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 727 - 732
  • [5] Privacy-Preserving Approximate Convex Hulls Protocol
    Zhu, Youwen
    Huang, Liusheng
    Yang, Wei
    Li, Dong
    Li, Lingjun
    Luo, Yonglong
    Dong, Fan
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 208 - 214
  • [7] Faster privacy-preserving location proximity schemes for circles and polygons
    Jarvinen, Kimmo
    Kiss, Agnes
    Schneider, Thomas
    Tkachenko, Oleksandr
    Yang, Zheng
    IET INFORMATION SECURITY, 2020, 14 (03) : 254 - 265
  • [8] Protocol for privacy-preserving intersect-determination of two polygons
    Luo, Yong-Long
    Huang, Liu-Sheng
    Xu, Wei-Jiang
    Jing, Wei-Wei
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2007, 35 (04): : 685 - 691
  • [9] Privacy-preserving statistical computing protocols for private set intersection
    Niu, Ziyu
    Wang, Hao
    Li, Zhi
    Song, Xiangfu
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 10118 - 10139
  • [10] Privacy-Preserving Quantum Two-Party Geometric Intersection
    Liu, Wenjie
    Xu, Yong
    Yang, James C. N.
    Yu, Wenbin
    Chi, Lianhua
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 60 (03): : 1237 - 1250