期刊文献+

隐私保护的点与多边形位置关系判定协议 被引量:1

Relative Position Determination of Point and Polygon with Privacy Preserving
下载PDF
导出
摘要 隐私保护的计算几何是安全多方计算的一个全新研究领域。针对已有的安全判定点与多边形位置关系协议的缺陷,在半诚实模型下,提出基于铅垂线算法和不经意传输协议的隐私保护的点与多边形位置关系判定协议,并对该协议的正确性、计算复杂性、通信复杂性和安全性进行了分析和证明。新的协议不仅可以在实数域中使用,不局限于凸多边形,而且能适用于多边形带孔的情况。 Privacy preserving computational geometry is a new research branch of secure multiparty computation. Because of the shortcomings and restraints in existing protocols, in semi-honest, a new protocol based on plumb line algorithm and oblivious transfer protocol for relative position determination of point and polygon was proposed in this paper. The correctness, computation efficient and security were analyzed and proved in this paper as well. The new protocol not only can be used in real number field, but also can be used in any polygon with great efficient.
作者 朱如锦 杨波
出处 《计算机科学》 CSCD 北大核心 2012年第B06期38-40,43,共4页 Computer Science
基金 国家自然科学基金(60773175和60973134) 现代通信国家重点实验室基金(9140C1108020906) 广东省自然科学基金(10351806001000000 10151064201000028和9151064201000058)资助
关键词 安全多方计算 计算几何 多边形 铅垂线算法 不经意传输协议 Secure multiparty computation Computational geometry Polygon Plumb line algorithm Oblivious transfer
  • 相关文献

参考文献13

  • 1Goldreieh O. Foundations of Cryptography: Volume II, Basic Applications [M]. Cambridge: Cambridge University Press, 2004.
  • 2Yao A C. Protocols for secure computations [A]//Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science [C]. Chicago, USA, 1982 : 160-164.
  • 3Du Wen-liang, Atallah M J. Privacy-preserving cooperative scientific computations[C]//14^th IEEE Computer Security Foundations Workshop. Nova Scotia,Canada,June 2001:11-13.
  • 4Luo W J, Li X. A study of secure multi-party statistical analysis [C]//Proceeding of IEEE International Conference on Computer Networks and Mobile Computing. Shanghai, 2003:377-382.
  • 5Lin H Y, Tzengw G. An efficient solution to the millionaires' problem based on homomorphic encryption [M]. Applied Cryp- tography and Network Security, LNCS 3531. Berlin: Springer- Verlag, 2005 : 456-466.
  • 6Brankovic L, Estivill-Castro V. Privacy Issues in Knowledge Discovery and Data Mining [C]//Melbourne, Victoria, Australia: Proc. of Australian Institute of Computer Ethics Conference. 1999.
  • 7Atallah M J, Du W L. Secure multi-party computational geometry [C]//Dehne F K H A, Sack J R, T amassial R. Proceedings of Seventh International Workshop on Algorithms and Data Structures. London: Springer-Verlag, 2001 : 165-179.
  • 8Shun-DongLi Yi-QiDai.Secure Two-Party Computational Geometry[J].Journal of Computer Science & Technology,2005,20(2):258-263. 被引量:36
  • 9LUO Yonglong,HUANG Liusheng,ZHONG Hong,CHEN Guoliang.A Secure Protocol for Determining Whether a Point is Inside a Convex Polygon[J].Chinese Journal of Electronics,2006,15(4):578-582. 被引量:18
  • 10李顺东,戴一奇,王道顺,罗平.几何相交问题的多方保密计算[J].清华大学学报(自然科学版),2007,47(10):1692-1695. 被引量:11

二级参考文献30

  • 1Shun-DongLi Yi-QiDai.Secure Two-Party Computational Geometry[J].Journal of Computer Science & Technology,2005,20(2):258-263. 被引量:36
  • 2李顺东,司天歌,戴一奇.集合包含与几何包含的多方保密计算[J].计算机研究与发展,2005,42(10):1647-1653. 被引量:21
  • 3黄东平,王华勇,黄连生,戴一奇.动态门限秘密共享方案[J].清华大学学报(自然科学版),2006,46(1):102-105. 被引量:21
  • 4Wenliang Du, Mikhail J Atallah. Secure multi-partycomputation problems and their applications: A reviewand open problems. In New Security Paradigms Work-shop 2001,September 11-13, 2001, Cloudcroft, NewMexico,USA., pp.11-20. Available at http://www.cis.syr.edu/ wedu/Research/publication.ht ml.
  • 5Mikhail J Atallah, Wenliang Du. Secure multi-party compu-tational geometry. In 7th Int. Workshop on Algorithms and Data Structures (WADS 2001), Lecture Note in Computer Sciences 2125, Springer-Verlag, New York, 2001, pp.165-179.
  • 6Yao A. Protocols for secure computations. In Proc. the 23rd Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA., 1982,pp.160-164.
  • 7Oded Goldreich, Silvio Micali, Avi Wigderson. How to play any mental game. In Proc. the 19th Annual ACM Conference on Theory of Computing, ACM Press, New York, 1987,pp.218-229.
  • 8Goldwasser S. Multi-party computations: Past and present.In Proc. the 16th Annual ACM Symposium on Principles of Distributed Computing, ACM Press, New York, 1997, pp.21-24.
  • 9Lindell Y. Parallel coin-tossing and constant-round secure two-party computation. Journal of Cwptology, 2003, 16(3):143-184.
  • 10Goldreich O. Secure multi-party computation (working draft).Available at http://www.wisdom.weizmann.ac.il/home/oded/publichtml/foc.html, 2002.

共引文献78

同被引文献14

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部