Secure two-party line segments intersection scheme and its application in privacy-preserving convex hull intersection

被引:2
|
作者
机构
[1] [1,Sun, Mao-Hua
[2] 1,2,Luo, Shou-Shan
[3] 1,Xin, Yang
[4] 1,Yang, Yi-Xian
来源
Sun, M.-H. | 1600年 / Editorial Board of Journal on Communications卷 / 34期
关键词
D O I
10.3969/j.issn.1000-436x.2013.01.004
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data
    Chen, Ling
    Yu, Ting
    Chirkova, Rada
    INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2016, 2016, 9895 : 187 - 203
  • [42] Consensus Control Based on Privacy-Preserving Two-Party Relationship Test Protocol
    Wang, Hanzhou
    Li, Dongyu
    Guan, Zhenyu
    Liu, Yizhong
    Liu, Jianwei
    IEEE CONTROL SYSTEMS LETTERS, 2023, 7 : 2185 - 2190
  • [43] TPOT: a Two-party Privacy-preserving Ownership Transfer Protocol for RFID Tags
    Yin, Xi
    An, Zhulin
    Xu, Yongjun
    Long, Hua
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [44] Privacy-Preserving Two-Party k-Means Clustering in Malicious Model
    Akhter, Rahena
    Chowdhury, Rownak Jahan
    Emura, Keita
    Islam, Tamzida
    Rahman, Mohammad Shahriar
    Rubaiyat, Nusrat
    2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW), 2013, : 121 - 126
  • [45] Design of Secure and Privacy-Preserving Data Sharing Scheme Based on Key Aggregation and Private Set Intersection in Medical Information System
    Oh, Jihyeon
    Son, Seunghwan
    Kwon, DeokKyu
    Kim, Myeonghyun
    Park, Yohan
    Park, Youngho
    MATHEMATICS, 2024, 12 (11)
  • [46] Privacy-Preserving Two-Party Distributed Association Rules Mining on Horizontally Partitioned Data
    Zhang, Feng
    Rong, Chunming
    Zhao, Gansen
    Wu, Jinxia
    Wu, Xiangning
    2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA), 2013, : 633 - 640
  • [47] A Two-Party Combined Cryptographic Scheme and Its Application
    Wang Shengbao
    Xie Qi
    Tang Qiang
    Zeng Peng
    Chen Wei
    CHINESE JOURNAL OF ELECTRONICS, 2012, 21 (04): : 687 - 691
  • [48] Quantum secure privacy preserving technique to obtain the intersection of two datasets for contact tracing
    Debnath, Sumit Kumar
    Srivastava, Vikas
    Mohanty, Tapaswini
    Kundu, Nibedita
    Sakurai, Kouichi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 66
  • [49] Quantum Private Set Intersection Cardinality Protocol With Application to Privacy-Preserving Condition Query
    Shi, Run-Hua
    Li, Yi-Fei
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2022, 69 (06) : 2399 - 2411
  • [50] Privacy-preserving kNN query processing algorithms via secure two-party computation over encrypted database in cloud computing
    Hyeong-Jin Kim
    Hyunjo Lee
    Yong-Ki Kim
    Jae-Woo Chang
    The Journal of Supercomputing, 2022, 78 : 9245 - 9284