期刊文献+

TWO PRIVACY-PRESERVING PROTOCOLS FOR POINT-CURVE RELATION 被引量:6

TWO PRIVACY-PRESERVING PROTOCOLS FOR POINT-CURVE RELATION
下载PDF
导出
摘要 Numerous privacy-preserving issues have emerged along with the fast development of Internet, both in theory and in real-life applications. To settle the privacy-preserving problems, secure multi-party computation is essential and critical. In this paper, we have solved two problems regarding to how to determine the position relation between points and curves without revealing any private information. Two protocols have been proposed in order to solve the problems in different conditions. In addition, some building blocks have been developed, such as scalar product protocol, so that we can take advantage of them to settle the privacy-preserving computational geometry problems which are a kind of special secure multi-party computation problems. Moreover, oblivious transfer and power series expansion serve as significant parts in our protocols. Analyses and proofs have also been given to argue our conclusion. Numerous privacy-preserving issues have emerged Mong with the fast development of Internet, both in theory and in real-life applications. To settle the privacy-preserving problems, secure multi-party computation is essential and critical. In this paper, we have solved two problems regarding to how to determine the position relation between points and curves without revealing any private information. Two protocols have been proposed in order to solve the problems in different conditions. In addition, some building blocks have been developed, such as scalar product protocol, so that we can take advantage of them to settle the privacy-preserving computational geometry problems which are a kind of special secure multi-party computation problems. Moreover, oblivious transfer and power series expansion serve as significant parts in our protocols. Analyses and proofs have also been given to argue our conclusion.
出处 《Journal of Electronics(China)》 2012年第5期422-430,共9页 电子科学学刊(英文版)
基金 Supported by the National Natural Science Foundation of China (No. 61070189, 60673065) the National High Technology Development Program (No. 2008AA01Z419)
关键词 Secure multiparty computation PRIVACY-PRESERVING Point-curve relation Power series expansion Secure multiparty computation Privacy-preserving Point-curve relation Power seriesexpansion
  • 相关文献

参考文献5

二级参考文献34

  • 1Shun-DongLi Yi-QiDai.Secure Two-Party Computational Geometry[J].Journal of Computer Science & Technology,2005,20(2):258-263. 被引量:36
  • 2LYUBASHEVSKY V, PALACIO A, SEGEV, G. Public-key cryptographic primitives provably as secure as subset sum[A]. TCC 2010[C]. LNCS 5978, Zurich, 2010. 382-400.
  • 3ALWEN J, PEIKERT C. Generating shorter bases for hard random lattices[A]. STACS'09[C]. Freiburg, 2009.75-86.
  • 4RUCKERT M. Lattice-based blind signatures[EB/OL], http://eprint. iacr.org.2008/322.
  • 5RABIN M. How to Exchange Secrets by Oblivious Transfer[R].Technical Report TR-81, Aiken Computation Laboratory, Harvard University, 1981.
  • 6EVEN S, GOLDREICH O, LEMPEL A. A randomized protocol for signing contracts [J]. Comm ACM, 1985, 28: 637-647.
  • 7BRASSARD G, CREPEAU C, ROBERT J M. All-or-nothing disclosure of secrets[A]. Crypto '86[C]. Santa Barbara, California, 1987.234-238.
  • 8TZENG W G. Efficient I-out-of-n oblivious transfer schemes with universally usable parameters[J]. IEEE Transations on Computers, 2004,53(2):232-240.
  • 9CAMENISCH J, DUBOVITSKAYA M, NEVEN G. Oblivious transfer with access control[A]. 16th ACM Conference on Computer and Communications Security (ACM CCS 2009)[C]. Chicago, 2009. 131-140.
  • 10AJTAI M. Generating hard instances of lattice problems[J]. Quadernidi Matematica, 2004, 13:1-32.

共引文献70

同被引文献27

引证文献6

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部