全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

保护私有信息几何对象的相对位置计算

DOI: doi:10.3969/j.issn.1006-7043.2011.04.011

Keywords: 隐私保护, 几何对象, 相对位置计算, 点积协议

Full-Text   Cite this paper   Add to My Lib

Abstract:

为了探讨在保护参与方隐私前提下,空间几何对象之间的相对位置计算问题,该文在半诚实模型下,基于点积协议,提出了向量夹角协议和向量差比值协议,在此基础上,给出了判定线、线相对位置的新方法,构建了空间线、面夹角计算协议及线、线距离计算协议.给出了协议的正确性证明,并对其安全性和复杂度进行了理论分析.分析结果表明,所提方法调用点积运算和秘密比较运算的次数少于现有方法,有效降低了协议计算复杂度,可用于解决其他更多的安全多方计算几何问题.

References

[1]  TZENG W G. Efficient oblivious transfer schemes [C]//Lecture Notes in Computer Science. Paris:Springer?Verlag, 2002:159-171.
[2]  YAO A C. Protocols for secure computations [C]//Proc. of the 23rd Annual IEEE Symposium on Foundations of Computer Science. Chicago, USA, 1982: 160-164.
[3]  GOLDREICH O. Secure multi?party computation(Manuscript version1.3, 2002)[EB/OL].(2009-10-09). http://www.wisdom.weizmann.ac.il/~oded/pp.html.?
[4]  DU W L, ATALLAH M J. Secure multi-party computation problems and their applications: a review and open problems[C]//Proc of New Security Paradigms Workshop. Cloudcroft, New Mexico, USA, 2001:11-20.?
[5]  仲红,黄刘生,罗永龙. 基于安全多方求和的多候选人 电子选举方案[J].计算机研究与发展, 2006,43 (8):1405-1410. ?ZHONG Hong, HUANG Liusheng, LUO Yonglong. A multi?candidate electronic voting scheme based on secure sum protocol[J]. Computer Research and Development, 2006, 43 (8):1405-1410.?
[6]  ATALLAH M J, DU W L. Secure multi?party computational geometry[C]// WADS2001, Providence, Rhode Island, USA, 2001: 165-179. ?
[7]  罗永龙,黄刘生,荆巍巍,等.空间几何对象相对位置判 定中的私有信息保护[J].计算机研究与发 展,2006,43(3):410-416. ?LUO Yonglong,HUANG Liusheng,JING Weiwei, et al. Privacy protection in the relative position determination for two spatial geometric objects [J].Computer Research and Development, 2006, 43(3): 410-416.?
[8]  罗永龙,黄刘生,荆巍巍,等. 保护私有信息的叉积协议及 其应用[J].计算机学报,2007,30(2):248-254. ?LUO Yonglong,HUANG Liusheng,JING Weiwei, et al. Privacy?preserving cross product protocol and its applications[J].Chinese Journal of Computers,2007,30(2):248-254.?
[9]  LI S D, DAI Y Q. Secure two party computational geometry[J].Journal of Computer Science and Technology,2005,20(2):258-263.?
[10]  刘文,罗守山.安全两方圆计算协议[J].北京邮电大学 学报, 2009, 32(3):32-35. ?LIU Wen, LUO Shoushan . A study of secure two?party circle computation problem[J]. Journal of Beijing University of Posts and Telecommunications, 2009, 32(3):32-35.?
[11]  ZHONG H, HUANG L S, XIONG Y. A weighted Evoting scheme with secret weights [J].Chinese Journal of Electronics, 2006,15(3):413-416.?
[12]  LUO Y L,HUANG L S, ZHONG H. Secure two?party point?circle inclusion problem[J]. Journal of Computer Science and Technology, 2007, 22(1):88-91.?

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133