Privacy-preserving Practical Convex Hulls Protocol

被引:4
|
作者
Zhu, Youwen [1 ]
Huang, Liusheng [1 ]
Yang, Wei [1 ]
Chen, Zhili [1 ]
Li, Lingjun [1 ]
Yu, Zhenshan [1 ]
Luo, Yonglong [1 ]
机构
[1] Univ Sci & Technol China, Natl High Performance Comp Ctr Hefei, Dept Comp Sci & Technol, Hefei 230027, Peoples R China
关键词
D O I
10.1109/FCST.2008.10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure Multi-party Computation has been a hot research topic of cryptograhy for about two decades, and the Convex Hulls problem is a special case of it. However the precise convex hulls will certainly expose all vertexes and even bring about unfairness. Therefore the practical approximate convex hulls are in need In this paper we summarize and discuss the Convex Hulls problem, and then we present a more effective new protocol to compute the approximate convex hulls. Furthermore, we analyze the security, communication complexity and efficiency of the protocol, and compare the new scheme with other privacy-preserving convex hulls protocols through simulated experiments. It shows that our privacy-preserving approximate convex hulls protocol is more effective than the previous privacy-preserving ones, and the new protocol is practical enough in many situations. Perfectly keeping privacy preserving and eliminating unfairness are the great advantages of our scheme.
引用
收藏
页码:10 / 16
页数:7
相关论文
共 50 条
  • [31] Privacy-preserving registration protocol for mobile network
    Liu, He
    Liang, Mangui
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (10) : 1653 - 1671
  • [32] Locap: Privacy-Preserving Location Proximity Protocol
    Choi, Kyung
    Kim, Mihui
    [J]. 2017 NINTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2017), 2017, : 994 - 998
  • [33] A Lightweight Privacy-Preserving Authentication Protocol for VANETs
    Li, Xiong
    Liu, Tian
    Obaidat, Mohammad S.
    Wu, Fan
    Vijayakumar, Pandi
    Kumar, Neeraj
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (03): : 3547 - 3557
  • [34] Protocol for Privacy-Preserving Set Pattern Matching
    Zheng Qiang
    Luo Shou-shan
    Xin Yang
    Yang Yi-xian
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 168 - 172
  • [35] Fedlabx: a practical and privacy-preserving framework for federated learning
    Yuping Yan
    Mohammed B. M. Kamel
    Marcell Zoltay
    Marcell Gál
    Roland Hollós
    Yaochu Jin
    Ligeti Péter
    Ákos Tényi
    [J]. Complex & Intelligent Systems, 2024, 10 : 677 - 690
  • [36] TrustAV: Practical and Privacy-Preserving Malware Analysis in the Cloud
    Deyannis, Dimitris
    Papadogiannaki, Eva
    Kalivianakis, Giorgos
    Vasiliadis, Giorgos
    Ioannidis, Sotiris
    [J]. PROCEEDINGS OF THE TENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2020, 2020, : 39 - 48
  • [37] Practical Strategy-Resistant Privacy-Preserving Elections
    Canard, Sebastien
    Pointcheval, David
    Santos, Quentin
    Traore, Jacques
    [J]. COMPUTER SECURITY (ESORICS 2018), PT II, 2018, 11099 : 331 - 349
  • [38] Fedlabx: a practical and privacy-preserving framework for federated learning
    Yan, Yuping
    Kamel, Mohammed B. M.
    Zoltay, Marcell
    Gal, Marcell
    Hollos, Roland
    Jin, Yaochu
    Peter, Ligeti
    Tenyi, Akos
    [J]. COMPLEX & INTELLIGENT SYSTEMS, 2024, 10 (01) : 677 - 690
  • [39] Practical privacy-preserving deep packet inspection outsourcing
    Li, Jie
    Su, Jinshu
    Chen, Rongmao
    Wang, Xiaofeng
    Chen, Shuhui
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (22):
  • [40] Privid: Practical, Privacy-Preserving Video Analytics Queries
    Cangialosi, Frank
    Agarwal, Neil
    Arun, Venkat
    Jiang, Junchen
    Narayana, Srinivas
    Sarwate, Anand
    Netravali, Ravi
    [J]. PROCEEDINGS OF THE 19TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION (NSDI '22), 2022, : 209 - 228