A privacy-preserving triangle inequality determination protocol and its applications

被引:0
|
作者
Luo, Shou-Shan [1 ,2 ,3 ]
Liao, Gan-Cai [1 ,2 ,3 ]
Liu, Wen [1 ,2 ,3 ]
机构
[1] State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
[2] Key Laboratory of Network and Information Attack and Defence Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
[3] National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
In triangle determination, if the side information is confidential to others, and provided by different users, it is the privacy-preserving triangle shape determination problem without solution by traditional method. By using scalar product protocol, a privacy-preserving triangle inequality determination protocol based on semi-honest is proposed, and the correctness, security and complexity are analyzed. The solution to privacy-preserving triangle shape determination problem and privacy-preserving vector comparison problem are proposed.
引用
收藏
页码:47 / 51
相关论文
共 50 条
  • [21] Privacy-Preserving Protocol for Epidemiology in Effect of Radiation
    Kikuchi, Hiroaki
    Sato, Tomoki
    Sakuma, Jun
    2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 831 - 836
  • [22] Privacy-Preserving Protocol for Data Stored in the Cloud
    Hongyi Su Geng Yang Dawei Li (College of Computer Science
    ZTE Communications, 2011, 9 (02) : 36 - 38
  • [23] Efficient Privacy-Preserving Face Identification Protocol
    Huang, Hai
    Wang, Luyao
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (04) : 2632 - 2641
  • [24] Privacy-preserving Practical Convex Hulls Protocol
    Zhu, Youwen
    Huang, Liusheng
    Yang, Wei
    Chen, Zhili
    Li, Lingjun
    Yu, Zhenshan
    Luo, Yonglong
    FCST: 2008 JAPAN-CHINA JOINT WORKSHOP ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2008, : 10 - 16
  • [25] An Efficient Privacy-preserving Authentication Protocol in VANETs
    Zhang, Jianhong
    Zhen, Weina
    Xu, Min
    2013 IEEE NINTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2013), 2013, : 272 - 277
  • [26] A protocol for privacy-preserving closest pair of points
    Liu, Jie
    Yang, Bo
    Pang, Xiaoqiong
    Liu, J. (jessica.lyh66@gmail.com), 2013, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09): : 6945 - 6953
  • [27] Strongly Privacy-Preserving Communication Protocol for VANETs
    Fan, Chun-I
    Sun, Wei-Zhe
    Huang, Shih-Wei
    Juang, Wen-Shenq
    Huang, Jheng-Jia
    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 119 - 126
  • [28] A Lightweight Privacy-Preserving Authentication Protocol for VANETs
    Li, Xiong
    Liu, Tian
    Obaidat, Mohammad S.
    Wu, Fan
    Vijayakumar, Pandi
    Kumar, Neeraj
    IEEE SYSTEMS JOURNAL, 2020, 14 (03): : 3547 - 3557
  • [29] Privacy-Preserving Approximate Convex Hulls Protocol
    Zhu, Youwen
    Huang, Liusheng
    Yang, Wei
    Li, Dong
    Li, Lingjun
    Luo, Yonglong
    Dong, Fan
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 208 - 214
  • [30] Locap: Privacy-Preserving Location Proximity Protocol
    Choi, Kyung
    Kim, Mihui
    2017 NINTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2017), 2017, : 994 - 998