Secure two-party line segments intersection scheme and its application in privacy-preserving convex hull intersection

被引:2
|
作者
机构
[1] [1,Sun, Mao-Hua
[2] 1,2,Luo, Shou-Shan
[3] 1,Xin, Yang
[4] 1,Yang, Yi-Xian
来源
Sun, M.-H. | 1600年 / Editorial Board of Journal on Communications卷 / 34期
关键词
D O I
10.3969/j.issn.1000-436x.2013.01.004
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity
    Beck, Martin
    Kerschbaum, Florian
    2013 IEEE INTERNATIONAL CONGRESS ON BIG DATA, 2013, : 31 - 37
  • [32] Strong Privacy-preserving Two-party Scalar Product Quantum Protocol
    Run-hua Shi
    Mingwu Zhang
    International Journal of Theoretical Physics, 2019, 58 : 4249 - 4257
  • [33] A Novel Privacy-Preserving Two-Party Vector Dominance Statistic Protocol
    Liu, Jie
    Long, Xiaoli
    Chen, Changpin
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 124 : 195 - 196
  • [34] Strong Privacy-preserving Two-party Scalar Product Quantum Protocol
    Shi, Run-hua
    Zhang, Mingwu
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (12) : 4249 - 4257
  • [35] Privacy-Preserving Verifiable Graph Intersection Scheme With Cryptographic Accumulators in Social Networks
    Zuo, Xiangjian
    Li, Lixiang
    Luo, Shoushan
    Peng, Haipeng
    Yang, Yixian
    Gong, Linming
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) : 4590 - 4603
  • [36] Privacy-Preserving Medical Data Sharing Scheme Based on Two-Party Cloud-Assisted PSI
    Lai, Chengzhe
    Zhang, Hanyue
    Lu, Rongxing
    Zheng, Dong
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (09): : 15855 - 15868
  • [37] A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party Analytics
    Mehnaz, Shagufta
    Bellala, Gowtham
    Bertino, Elisa
    PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 219 - 230
  • [38] Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity
    Cheon, Jung Hee
    Jarecki, Stanislaw
    Seo, Jae Hong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (08) : 1366 - 1378
  • [39] Privacy preserving sequential pattern mining based on secure two-party computation
    Ouyang, Wei-Min
    Huang, Qin-Hua
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 1227 - +
  • [40] Privacy preserving association rules mining based on secure two-party computation
    Ouyang, Weimin
    Huang, Qinhua
    INTELLIGENT CONTROL AND AUTOMATION, 2006, 344 : 969 - 975