Secure Multi-party Computational Geometry

نویسندگان

  • Mikhail J. Atallah
  • Wenliang Du
چکیده

The general secure multi-party computation problem is when multiple parties (say, Alice and Bob) each have private data (respectively, a and b) and seek to compute some function f(a; b) without revealing to each other anything unintended (i.e., anything other than what can be inferred from knowing f(a; b)). It is well known that, in theory, the general secure multi-party computation problem is solvable using circuit evaluation protocols. While this approach is appealing in its generality, the communication complexity of the resulting protocols depend on the size of the circuit that expresses the functionality to be computed. As Goldreich has recently pointed out [6], using the solutions derived from these general results to solve speci c problems can be impractical; problem-speci c solutions should be developed, for eÆciency reasons. This paper is a rst step in this direction for the area of computational geometry. We give simple solutions to some speci c geometric problems, and in doing so we develop some building blocks that we believe will be useful in the solution of other geometric and combinatorial problems as

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Two-party Protocols for Point Inclusion Problem

It is well known that, in theory, the general secure multiparty computation problem is solvable using circuit evaluation protocols. However, the communication complexity of the resulting protocols depend on the size of the circuit that expresses the functionality to be computed and hence can be impractical. Hence special solutions are needed for specific problems for efficiency reasons. The poi...

متن کامل

Privacy-Preserving Computational Geometry Problems on Conic Sections

Privacy-preserving computational geometry is a special secure multi-party computation and has many applications. In recent years, many scholars have focused on privacy-preserving computational geometry problems which are based on circle and polygon. However, as a branch of computational geometry problems, the private-computing on conic sections must be considered. Consequently, we study secure ...

متن کامل

Privacy-preserving Judgment of the Intersection for Convex Polygons

As the basic issues of computational geometry, intersection and union of convex polygons can solve lots of problems, such as economy and military affairs. And privacy-preserving judgment of the intersection and union for convex polygons are most popular issues for information security. Traditional method of making the polygons public does not satisfy the requirements of personal privacy. In thi...

متن کامل

A Secure Scalar Product Protocol and Its Applications to Computational Geometry

A secure scalar product protocol is a type of specific SMC problem, and has found various applications in many areas such as privacy-preserving data mining, privacy-preserving cooperative statistical analysis, and privacy-preserving geometry computation. In this paper, we firstly extend to a solution of homomorphic-encryption based secure scalar product protocol such that it enables the scheme ...

متن کامل

Improvement of a Secure Convex Hull Two-Party Computation Protocol

In 2008, Wang et. al. first investigate a sort of specific secure multi-party computation--secure convex hull two-party computation, and construct two protocols based on Gift wrapping method and Quick method separately. However, there are some errors in his protocol based on Quick method. This paper proposes two effective improved protocols. In addition, we analyze and compare security, computa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001