期刊文献+

Secure Two-Party Point-Circle Inclusion Problem 被引量:16

Secure Two-Party Point-Circle Inclusion Problem
原文传递
导出
摘要 保存隐私的计算几何学是特殊安全多党的计算;有许多应用。为决定一个点是否在一个圆内的以前的协议不是足够安全的。我们在场为计算在二个私人点之间的距离的一个二回合的协议;基于距离协议为点圆包括问题开发一个更多的有效协议。与前一解比较,我们的协议不仅是更安全的而且减少通讯回合的数字;模乘法的数字显著地。 Privacy-preserving computational geometry is a special secure multi-party computation and has many applications. Previous protocols for determining whether a point is inside a circle are not secure enough. We present a two-round protocol for computing the distance between two private points and develop a more efficient protocol for the point-circle inclusion problem based on the distance protocol. In comparison with previous solutions, our protocol not only is more secure but also reduces the number of communication rounds and the number of modular multiplications significantly.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2007年第1期88-91,共4页 计算机科学技术学报(英文版)
基金 Supported by the National Natural Science Foundation of China (Grant No. 60573171), the National Grand Fundaznental Research 973 Program of China, (Grant No. 2006CB303006),and Research Program of Anhui Province Education Department (Grant Nos.2006KJ024A and JYXM2005166). We are very grateful to Professor X. Yao at University of Birmingham for useful comments and some corrections. We also thank Professor H. Shen at Japhan Advanced Institute of Science and Technology for helpful suggestions.
关键词 计算机 安全协议 乘法 运算器 secure multi-party computation, computational geometry, homomorphic encryption scheme, private comparison
  • 相关文献

参考文献5

二级参考文献42

  • 1Wenliang Du, Mikhail J Atallah. Secure multi-partycomputation problems and their applications: A reviewand open problems. In New Security Paradigms Work-shop 2001,September 11-13, 2001, Cloudcroft, NewMexico,USA., pp.11-20. Available at http://www.cis.syr.edu/ wedu/Research/publication.ht ml.
  • 2Mikhail J Atallah, Wenliang Du. Secure multi-party compu-tational geometry. In 7th Int. Workshop on Algorithms and Data Structures (WADS 2001), Lecture Note in Computer Sciences 2125, Springer-Verlag, New York, 2001, pp.165-179.
  • 3Yao A. Protocols for secure computations. In Proc. the 23rd Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA., 1982,pp.160-164.
  • 4Oded Goldreich, Silvio Micali, Avi Wigderson. How to play any mental game. In Proc. the 19th Annual ACM Conference on Theory of Computing, ACM Press, New York, 1987,pp.218-229.
  • 5Goldwasser S. Multi-party computations: Past and present.In Proc. the 16th Annual ACM Symposium on Principles of Distributed Computing, ACM Press, New York, 1997, pp.21-24.
  • 6Lindell Y. Parallel coin-tossing and constant-round secure two-party computation. Journal of Cwptology, 2003, 16(3):143-184.
  • 7Goldreich O. Secure multi-party computation (working draft).Available at http://www.wisdom.weizmann.ac.il/home/oded/publichtml/foc.html, 2002.
  • 8Lindell Y, Pinkas B. Privacy preserving data mining. Journal of Cryptology, 2002, 15(3): 177-206.
  • 9Rakesh Agrawal, Ramakrishnan Srikant. Privacy-preserving data mining. In Proc. the PO00 ACM SIGMOD on Management of Data, ACM Press, New York. 2000. pp.439-450.
  • 10Ronald Fagin, Moni Naor, Peter Einkler. Comparing information without leaking it. Communications of the ACM, 1996,39(5): 77-85.

共引文献97

同被引文献117

引证文献16

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部