期刊文献+

不同坐标系下点圆关系的安全判定协议 被引量:1

Secure Determination Protocol of Point-circle Relationship Under Different Coordinates
下载PDF
导出
摘要 不同机构对点、圆等几何对象可能采用不同的坐标系。为此,在研究坐标系秘密变换协议和不同坐标系下两点距离计算协议的基础上,提出不同坐标系下点与圆相对位置关系判定协议和圆与圆相对位置关系判定协议,分析协议的正确性、安全性及复杂性。分析结果表明,在保护私有信息的条件下,该协议能解决不同坐标系下点与圆、圆与圆之间的相对位置安全判定问题。 In view of the situation that different institutions may adopt different coordinate system of geometric objects including point and circle,this paper is the first to propose and design two protocols for the point-circle relation determination problem and the circle-circle relation determination problem based on the two protocols for privacy preserving coordinate transformation and distance measure of different coordinates.Their correctness,security and efficiency are analyzed.Analysis shows that problem of determining the relative position of point-circle and circle-circle is successfully solved in the paper.
出处 《计算机工程》 CAS CSCD 2012年第1期105-107,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60703071) 安徽省自然科学基金资助项目(070412043)
关键词 安全多方计算 安全几何计算 坐标变换 两点距离 点圆关系 secure multi-party computation secure geometry computation coordinate transformation distance between two points point-circle relationship
  • 相关文献

参考文献9

  • 1Yao A C. Protocols for Secure Computation[C]//Proc. of the 23rd IEEE Symp. on Foundation of Computer Science. Chicago, USA: IEEE Computer Society, 1982: 160-164.
  • 2Cachin C. Efficient Private Bidding and Auctions with an Obli- vious Third Party[C]//Proc. of the 6th ACM Conf. on Computer and Communications Security. New York, USA: ACM Press, 1990: 120-127.
  • 3Goldreich O. Foundations of Cryptography, Basic Applications[M]. Cambridge, UK: Cambridge University Press, 2004: 233-278.
  • 4查俊,苏锦海,闫少阁,闫晓芳.姚氏百万富翁问题的高效解决方案[J].计算机工程,2010,36(14):124-126. 被引量:5
  • 5Atallah M J, Du Wenliang. Secure Multi-party Computational Geometry[C]//Proc. of the 7th International Workshop on Algorithms and Data Structures. New York, USA: Springer-Verlag, 2001 : 165-179.
  • 6王涛春,罗永龙,左开中,杜安红.隐私保护的不同坐标系两点距离计算[J].计算机科学,2011,38(8):65-68. 被引量:2
  • 7Paillier P. Public-key Cryptosystems Based on Composite Degree Residuosity Classes[C]//Proc. of EUROCRYPT'99. [S. 1.]: Springer- Verlag, 1999: 223-238.
  • 8秦静,张振峰,冯登国,李宝.无信息泄漏的比较协议[J].软件学报,2004,15(3):421-427. 被引量:49
  • 9Clifton C, Kantarcioglu M. Tools for Privacy Peserving Destri- buted Data Mining[J]. ACM SIGKDD Explorations Newsletter, 2002, 4(2): 28-34.

二级参考文献28

  • 1李顺东,戴一奇,游启友.姚氏百万富翁问题的高效解决方案[J].电子学报,2005,33(5):769-773. 被引量:43
  • 2罗永龙,黄刘生,荆巍巍,徐维江.空间几何对象相对位置判定中的私有信息保护[J].计算机研究与发展,2006,43(3):410-416. 被引量:44
  • 3罗永龙,黄刘生,仲红.Secure Two-Party Point-Circle Inclusion Problem[J].Journal of Computer Science & Technology,2007,22(1):88-91. 被引量:16
  • 4刘宗泉,贾志强,邢诚,付先国.GPS网WGS-84平差坐标向地方独立坐标的转换[J].测绘信息与工程,2007,32(1):33-35. 被引量:14
  • 5Yao A C.Protocols for Secure Computation[C] //Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science.Los Alamitos,CA,USA:IEEE Computer Society Press,1982:160-164.
  • 6Goldreich O,Micali S,Wigerson A.How to Play Any Mental Game[C] //Proceedings of the 19th Annual ACM Conference on Theory of Computing.New York,USA:ACM Press,1987:218-229.
  • 7Ioannidis I,Grama A.An Efficient Protocol for Yao's Millionaires' Problem[C] //Proceedings of the 36th Hawaii International Conference on System Sciences.Hawaii,USA:[s.n.] ,2003.
  • 8Schoenmakers B,Tuyls P.Practical Two-party Computation Based on the Conditional Gate[C] //Proceedings of Asiacrypt'04.Jeju,Korea:[s.n.] ,2004.
  • 9Goldreich O. Secure multi-party computation, manuscript version 1.3. 2002. htttp://theory.lcs.mit.edu/-oded
  • 10Cramer R. Introduction to secure computation. In: Damgaard I, ed. Lectures on Data Security-Modern Cryptology in Theory and Practice. Lecture Notes in Computer Science, Vol 1561. Springer-Verlag, 1999. 16-62.

共引文献53

同被引文献13

引证文献1

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部