Privacy-preserving Practical Convex Hulls Protocol

被引:4
|
作者
Zhu, Youwen [1 ]
Huang, Liusheng [1 ]
Yang, Wei [1 ]
Chen, Zhili [1 ]
Li, Lingjun [1 ]
Yu, Zhenshan [1 ]
Luo, Yonglong [1 ]
机构
[1] Univ Sci & Technol China, Natl High Performance Comp Ctr Hefei, Dept Comp Sci & Technol, Hefei 230027, Peoples R China
关键词
D O I
10.1109/FCST.2008.10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure Multi-party Computation has been a hot research topic of cryptograhy for about two decades, and the Convex Hulls problem is a special case of it. However the precise convex hulls will certainly expose all vertexes and even bring about unfairness. Therefore the practical approximate convex hulls are in need In this paper we summarize and discuss the Convex Hulls problem, and then we present a more effective new protocol to compute the approximate convex hulls. Furthermore, we analyze the security, communication complexity and efficiency of the protocol, and compare the new scheme with other privacy-preserving convex hulls protocols through simulated experiments. It shows that our privacy-preserving approximate convex hulls protocol is more effective than the previous privacy-preserving ones, and the new protocol is practical enough in many situations. Perfectly keeping privacy preserving and eliminating unfairness are the great advantages of our scheme.
引用
收藏
页码:10 / 16
页数:7
相关论文
共 50 条
  • [1] Privacy-Preserving Approximate Convex Hulls Protocol
    Zhu, Youwen
    Huang, Liusheng
    Yang, Wei
    Li, Dong
    Li, Lingjun
    Luo, Yonglong
    Dong, Fan
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 208 - 214
  • [2] A Practical Three-dimensional Privacy-preserving Approximate Convex Hulls Protocol
    Li, Dong
    Huang, Liusheng
    Yang, Wei
    Zhu, Youwen
    Luo, Yonglong
    Chen, Zhili
    Li, Lingjun
    Ye, Yuri
    [J]. FCST: 2008 JAPAN-CHINA JOINT WORKSHOP ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2008, : 17 - 23
  • [3] A Practical Solution for Privacy-preserving Approximate Convex Hulls Problem
    Li, Dong
    Huang, Liusheng
    Yang, Wei
    Zhu, Youwen
    Luo, Yonglong
    Li, Lingjun
    Chen, Zhili
    [J]. 2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 539 - 544
  • [4] Privacy-preserving protocols for finding the convex hulls
    Wang Qi
    Luo Yonglong
    Huang Liusheng
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 727 - 732
  • [5] Practical privacy-preserving benchmarking
    Kerschbaum, Florian
    [J]. PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 17 - 31
  • [6] A Privacy-Preserving Comparison Protocol
    Sutradhar, Kartick
    Om, Hari
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (06) : 1815 - 1821
  • [7] Privacy-Preserving Convex Factorization Machine
    Sun, Jie
    Li, Qi
    Jiang, Yong
    [J]. 2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,
  • [8] A Practical Privacy-Preserving Recommender System
    Badsha, Shahriar
    Yi, Xun
    Khalil, Ibrahim
    [J]. DATA SCIENCE AND ENGINEERING, 2016, 1 (03) : 161 - 177
  • [9] A Practical and Scalable Privacy-preserving Framework
    Avgerinos, Nikos
    D'Antonio, Salvatore
    Kamara, Irene
    Kotselidis, Christos
    Lazarou, Ioannis
    Mannarino, Teresa
    Meditskos, Georgios
    Papachristopoulou, Konstantina
    Papoutsis, Angelos
    Roccetti, Paolo
    Zuber, Martin
    [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, : 598 - 603
  • [10] Towards practical privacy-preserving protocols
    Demmler, Daniel
    [J]. IT-INFORMATION TECHNOLOGY, 2022, 64 (1-2): : 49 - 53