Privacy-preserving Judgment of the Intersection for Convex Polygons

被引:2
|
作者
Yao, Yifei [1 ]
Ning, Shurong [1 ]
Tian, Miaomiao [2 ]
Yang, Wei [2 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing, Peoples R China
[2] Natl High Performance Comp Ctr Hefei, Hefei, Anhui, Peoples R China
关键词
STC; secret comparison protocol; privacypreserving geometric computation; polygonal intersection; polygonal union;
D O I
10.4304/jcp.7.9.2224-2231
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
As the basic issues of computational geometry, intersection and union of convex polygons can solve lots of problems, such as economy and military affairs. And privacy-preserving judgment of the intersection and union for convex polygons are most popular issues for information security. Traditional method of making the polygons public does not satisfy the requirements of personal privacy. In this paper, a method to compute intersection and union of convex polygons in secure two-party computation (STC) model has been considered, both proportionate partition and unproportionate partition cases are studied. Scan line algorithm is used to figure out the geometry matter, while secret comparison protocol is used for saving the privacy, a series of protocols for this matter is proposed, which combines computational geometry and secure multi-party computation (SMC) technique to achieve the functionality of cooperation calculation without leaking so much privacy. At last, the security, complexity and applicability analysis of the protocols are also discussed.
引用
收藏
页码:2224 / 2231
页数:8
相关论文
共 50 条
  • [41] Quantum Private Set Intersection Cardinality Protocol With Application to Privacy-Preserving Condition Query
    Shi, Run-Hua
    Li, Yi-Fei
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2022, 69 (06) : 2399 - 2411
  • [42] PPCT: Privacy-Preserving Contact Tracing Using Concise Private Set Intersection Cardinality
    Yang, Qianheng
    Yang, Yuer
    Xu, Shiyuan
    Guo, Rongrong
    Xian, Huiguang
    Lin, Yifeng
    Chen, Xue
    Tan, Wuzheng
    Yiu, Siu-Ming
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2024, 32 (04)
  • [43] Achieving privacy-preserving sensitive attributes for large universe based on private set intersection
    Yang, Li
    Li, Cheng
    Cheng, Yuting
    Yu, Shui
    Ma, Jianfeng
    INFORMATION SCIENCES, 2022, 582 : 529 - 546
  • [44] Privacy-Preserving PayString Service
    de Cristo, Flaviene Scheidt
    Shbair, Wazen M.
    Trestioreanu, Lucian
    Malhotra, Aanchal
    State, Radu
    2021 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC), 2021,
  • [45] Privacy-Preserving Associative Classification
    Priyanka, Garach
    Darshana, Patel
    Radhika, Kotecha
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 2, 2018, 84 : 245 - 251
  • [46] Privacy-preserving email forensics
    Armknecht, Frederik
    Dewald, Andreas
    DIGITAL INVESTIGATION, 2015, 14 : S127 - S136
  • [47] Privacy-Preserving Portrait Matting
    Li, Jizhizi
    Ma, Sihan
    Zhang, Jing
    Tao, Dacheng
    PROCEEDINGS OF THE 29TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, MM 2021, 2021, : 3501 - 3509
  • [48] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    SIGMOD RECORD, 2000, 29 (02) : 439 - 450
  • [49] Privacy-preserving distributed clustering
    Erkin, Zekeriya
    Veugen, Thijs
    Toft, Tomas
    Lagendijk, Reginald L.
    EURASIP JOURNAL ON INFORMATION SECURITY, 2013, (01):
  • [50] Privacy-preserving webshopping with attributes
    Hampiholi, Brinda
    Alpar, Gergely
    2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), 2017, : 25 - 36