期刊文献+

Private Proximity Detection for Convex Polygons 被引量:1

Private Proximity Detection for Convex Polygons
原文传递
导出
摘要 Proximity detection is an emerging technology in Geo-Social Networks that notifies mobile users when they are in proximity. Nevertheless, users may be unwilling to participate in such applications if they are required to disclose their exact locations to a centralized server and/or their social friends. To this end, private proximity detection protocols allow any two parties to test for proximity while maintaining their locations secret. In particular, a private proximity detection query returns only a boolean result to the querier and, in addition, it guarantees that no party can derive any information regarding the other party's location. However, most of the existing protocols rely on simple grid decompositions of the space and assume that two users are in proximity when they are located inside the same grid cell. In this paper, we extend the notion of private proximity detection, and propose a novel approach that allows a mobile user to define an arbitrary convex polygon on the map and test whether his friends are located therein. Our solution employs a secure two-party computation protocol and is provably secure. We implemented our method on handheld devices and illustrate its efficiency in terms of both computational and communication costs. Proximity detection is an emerging technology in Geo-Social Networks that notifies mobile users when they are in proximity. Nevertheless, users may be unwilling to participate in such applications if they are required to disclose their exact locations to a centralized server and/or their social friends. To this end, private proximity detection protocols allow any two parties to test for proximity while maintaining their locations secret. In particular, a private proximity detection query returns only a boolean result to the querier and, in addition, it guarantees that no party can derive any information regarding the other party's location. However, most of the existing protocols rely on simple grid decompositions of the space and assume that two users are in proximity when they are located inside the same grid cell. In this paper, we extend the notion of private proximity detection, and propose a novel approach that allows a mobile user to define an arbitrary convex polygon on the map and test whether his friends are located therein. Our solution employs a secure two-party computation protocol and is provably secure. We implemented our method on handheld devices and illustrate its efficiency in terms of both computational and communication costs.
出处 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第3期270-280,共11页 清华大学学报(自然科学版(英文版)
基金 supported by the National Science Foundation CAREER Award IIS-0845262
关键词 proximity detection secure computations location privacy proximity detection secure computations location privacy
  • 相关文献

参考文献20

  • 1G.Zhong,I.Goldberg,and U.Hengartner,Louis,Lester and Pierre:Three protocols for location privacy,in Privacy Enhancing Technologies.Springer Berlin Heidelberg,2007,pp.62–76.
  • 2A.Narayanan,N.Thiagarajan,M.Lakhani,M.Hamburg,and D.Boneh,Location privacy via private proximitytesting,in Proceedings of NDSS,2011.
  • 3P.Paillier,Public-key cryptosystems based on composite degree residuosity classes,in EUROCRYPT,1999,pp.223–238.
  • 4T.El Gamal,A public-key cryptosystem and a signature scheme based on discrete logarithms,IEEE Transactions on Information Theory,vol.31,no.4,pp.469–472,1985.
  • 5Y.Lindell and B.Pinkas,Secure multiparty computation for privacy-preserving data mining,Journal of Privacy and Confidentiality,vol.1,no.1,pp.59–98,2009.
  • 6A.C.-C.Yao,How to generate and exchange secrets,in Foundations of Computer Science,1986,27th Annual Symposium on,1986,pp.162–167.
  • 7M.Naor and B.Pinkas,Computationally secure oblivious transfer,Journal of Cryptology,vol.18,no.1,pp.1–35,2005.
  • 8Y.Huang,D.Evans,J.Katz,and L.Malka,Faster secure two-party computation using garbled circuits,in USENIX Security Symposium,2011.
  • 9H.Lipmaa,Verifiable homomorphic oblivious transfer and private equality test,in ASIACRYPT,2003,pp.416–433.
  • 10P.Ruppel,G.Treu,A.K¨upper,and C.Linnhoff-Popien,Anonymous user tracking for location-based community services,in Location-and Context-Awareness.Springer Berlin Heidelberg,2006,pp.116–133.

同被引文献5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部