期刊文献+

凸多边形相似判定问题

Similarity Judgment Problem of Convex Polygons
下载PDF
导出
摘要 本文通过利用已有的秘密判定相等协议、集合相等判定协议、数据对应成比例判定协议,设计出凸多边形相似判定协议,并分析了其正确性、安全性和复杂性. Convex polygon,as a relatively common geometric figure,has a wide range of applications in daily life,and it has become a research direction in the Privacy Preserving Computational Geometry(PPCG).In this paper,by using secret decision equality protocol,set equality decision protocol and proportional agreement protocol,we propose a protocol in similarity judgment problem of convex polygons.And furthermore analyze correctness,security and complexity.
作者 唐乐红 TANG Le-hong(Yango College, Fuzhou 350015, China)
机构地区 福州阳光学院
出处 《洛阳师范学院学报》 2017年第11期13-15,共3页 Journal of Luoyang Normal University
关键词 计算几何 集合相等 凸多边形 相似判定 computational geometry set equality convex polygon similarity judgment
  • 相关文献

参考文献2

二级参考文献12

  • 1CAO Zhenfu ZHU Haojin LU Rongxing.Provably secure robust threshold partial blind signature[J].Science in China(Series F),2006,49(5):604-615. 被引量:5
  • 2O. Gotdreich. Secure multl-party computation (manuscript version 1.3). http ://theory. lcs. mit. edu/- oded, 2002.
  • 3A. C. Yao. Protocols for secure computations. In: Proc. 23rd Annual IEEE Symposium on Foundations of Computer Science.Los Alamitos: IEEE Computer Society Press, 1982. 160 - 164.
  • 4C. Cachin. Efficient private bidding and auctions with an oblivious third party. In: Proe. 6th ACM Conf. Computer and Communications Security. New York: ACM Press, 1999. 120-127.
  • 5A. C. Yao. How to generate and exchange secrets. In; Proe.27th IEEE Symposium on Foundations of Computer Science, Los Alamitos: IEEE Computer Society Press, 1986. 162- 167.
  • 6O. Goldreich, S. Micali, A. Wigderson. How to play any mental game. In: Prec. 19th Annual ACM Symposium on Theory of Computing. New York: ACM Press, 1987. 218-229.
  • 7S. Goldwasser. Multi-party computations: Past and present, In:Proc. 16th Annual ACM Symposium on Principles of Distributed Computing. New York: ACM Press, 1997. 1 -6.
  • 8Mikhail J. Atallah, Wenliang Du. Secure muhi-party computational geometry. In: Lecture Notes in Computer Science 2125. Berlin: Springer, 2001. 165-179.
  • 9J.Vaidya,C.Clifton.Privacy preserving association rule mining in vertically partitioncd data.In:Proc.8th ACM SIGKDD Int'l Conf.Knowledge Discovery and Data Mining.New York:ACM Press,2002.639-644.
  • 10I. Ioannidis, A. Grama, M. Atallah. A secure protocol for computing dot-products in clustered and distributed environments,In:Proc.2002 Int'l Conf.Paralel Processing.Los Alamitios:IEEE Computer Society Press,2002.379-384.

共引文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部