期刊文献+

保护私有信息的点线关系判定协议及其应用 被引量:19

Privacy-Preserving Point-Line Relation Determination Protocol and Its Applications
下载PDF
导出
摘要 在半诚实模型下,利用加法同态加密体制设计了一个保护私有信息的点线关系判定协议;同时利用该协议设计了保护私有信息的线段相交判定问题和保护私有信息的点包含判定问题的解决方案.保护私有信息的点线关系判定协议,可以保密地判断点在直线正侧、负侧和在直线上;保护私有信息的线段相交判定协议,可以保密地判断不同参与方拥有的直线是否相交;保护私有信息的点包含判定协议,可以保密判断不同参与方拥有点和多边形之间的包含关系.最后分析和证明了这些协议的正确性、安全性和复杂性. A privacy-preserving point-line relation determination protocol based on additive homomorphism encryption is developed in semi-honest model. The privacy-preserving point-line relation determination protocol can be used to solve many privacy-preserving computational geometry problems, such as segments intersection problem and point inclusion problem. The privacy-preserving point-line relation determination protocol can be also used to determine either the point is at the positive side, negative side, or on the line privately. Further more, the privacy-preserving segments intersection protocol can be used to determine two lines supplied by different users intersect securely; and the privacy-preserving point inclusion protocol can be used to determine the relation of a point and a polygon supplied by different users. Finally, the correctness, security and efficiency of these protocols are analyzed.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2008年第2期72-75,共4页 Journal of Beijing University of Posts and Telecommunications
基金 西安电子科技大学综合业务网理论及关键技术国家重点实验室开放课题项目(ISN7-01)
关键词 安全多方计算 计算几何 点线关系判定 加法同态加密体制 secure multi-party computation computational geometry point-line relation determination additive homomorphic encryption
  • 相关文献

参考文献8

  • 1Yao Qizhi. Protocols for secure computations [ C]//Proceedings of 23rd Annual IEEE Symposium on Foundations of Computer Science. Los Alamitos: IEEE Computer Society Press, 1982: 160-164.
  • 2Goldreich O, Micali S, Wigderson A. How to play any mental game[C]//The 19th Annual ACM Conference on Theory of Computing. New York: ACM, 1987: 218- 229.
  • 3Du Wenliang, Atallah M J. Privacy-preserving cooperative scientific computations[C]//Proceedings of the 14th IEEE Computer Security Workshop. Nova Scotia: IEEE Computer Society Press, 2001: 273-282.
  • 4Mikhail J A, Du Wenliang. Secure multi-party computational geometry[ C]// Proceedings of the 7th International Workshop on Algorithms and Data Structures. Berlin: Springer, 2001: 165-179.
  • 5Lindell Y, Pinkas B. Privacy preserving data mining[J]. Journal of Cryptology, 2002, 15(3) : 177-206.
  • 6刘文,罗守山,陈萍.利用El Gamal密码体制解决安全多方多数据排序问题[J].通信学报,2007,28(11):1-5. 被引量:13
  • 7刘文,罗守山,陈萍.基于滑动窗口和交换加密函数解决SMP的新方案[J].计算机工程,2007,33(22):163-165. 被引量:3
  • 8罗永龙,黄刘生,荆巍巍,徐维江.空间几何对象相对位置判定中的私有信息保护[J].计算机研究与发展,2006,43(3):410-416. 被引量:44

二级参考文献21

  • 1O. Gotdreich. Secure multl-party computation (manuscript version 1.3). http ://theory. lcs. mit. edu/- oded, 2002.
  • 2A. C. Yao. Protocols for secure computations. In: Proc. 23rd Annual IEEE Symposium on Foundations of Computer Science.Los Alamitos: IEEE Computer Society Press, 1982. 160 - 164.
  • 3C. Cachin. Efficient private bidding and auctions with an oblivious third party. In: Proe. 6th ACM Conf. Computer and Communications Security. New York: ACM Press, 1999. 120-127.
  • 4A. C. Yao. How to generate and exchange secrets. In; Proe.27th IEEE Symposium on Foundations of Computer Science, Los Alamitos: IEEE Computer Society Press, 1986. 162- 167.
  • 5O. Goldreich, S. Micali, A. Wigderson. How to play any mental game. In: Prec. 19th Annual ACM Symposium on Theory of Computing. New York: ACM Press, 1987. 218-229.
  • 6S. Goldwasser. Multi-party computations: Past and present, In:Proc. 16th Annual ACM Symposium on Principles of Distributed Computing. New York: ACM Press, 1997. 1 -6.
  • 7Mikhail J. Atallah, Wenliang Du. Secure muhi-party computational geometry. In: Lecture Notes in Computer Science 2125. Berlin: Springer, 2001. 165-179.
  • 8J.Vaidya,C.Clifton.Privacy preserving association rule mining in vertically partitioncd data.In:Proc.8th ACM SIGKDD Int'l Conf.Knowledge Discovery and Data Mining.New York:ACM Press,2002.639-644.
  • 9I. Ioannidis, A. Grama, M. Atallah. A secure protocol for computing dot-products in clustered and distributed environments,In:Proc.2002 Int'l Conf.Paralel Processing.Los Alamitios:IEEE Computer Society Press,2002.379-384.
  • 10C. Clifton, M. Kantarcioglu, et al. Tools for privacy preserving distributed data mining. SIGKDD Explorations, 2002, 4 (2) : 28-34.

共引文献56

同被引文献88

引证文献19

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部