Secure multiparty computation of solid geometric problems and their applications

被引:47
|
作者
Li, Shundong [1 ]
Wu, Chunying [1 ]
Wang, Daoshun [2 ]
Dai, Yiqi [2 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Peoples R China
[2] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Secure multiparty computation; Solid geometry; Protocol; Simulation paradigm; KEY AGREEMENT PROTOCOL;
D O I
10.1016/j.ins.2014.04.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure multiparty computation is an area of recent research in the international cryptographic community, and secure computational geometry is an essential field of secure multiparty computation. Most of the existing studies of secure multiparty computational geometric problems have focused on plane geometry, while very few have addressed solid geometry. Because solid geometry is an integral part of geometry and describes the real world better than plane geometry, research on secure computational solid geometry is appealing. Motivated by an interesting application, we first examine the problem of the secure multiparty computation of a tetrahedron, propose a solution, and prove that the solution is private using an accepted simulation paradigm. Using the solution to the tetrahedron problem as a building block, we further solve the secure multiparty computation of three other solid geometric problems, including the relationship between a point and a plane, the relationship between a line and a plane, and the relationship between two planes. We also demonstrate that the solutions to these problems are private. We analyze the computational and communication complexities of these solutions and show that the computational complexities are near or equal to the problems' minimum theoretical computational complexity and that the communication complexities are equal to the minimum theoretical communication complexity. Thus, these solutions are optimal. Finally, we show an interesting application of secure computational solid geometry. (C) 2014 Elsevier Inc. All rights reserved.
引用
下载
收藏
页码:401 / 413
页数:13
相关论文
共 50 条
  • [1] Practical applications of secure multiparty computation
    Talviste, Riivo
    Cryptology and Information Security Series, 2015, 13 : 246 - 251
  • [2] Key technologies and applications of secure multiparty computation
    Guo, X. (guoxiaoqiang@heuu.edu.cn), 1600, Universitas Ahmad Dahlan, Jalan Kapas 9, Semaki, Umbul Harjo,, Yogiakarta, 55165, Indonesia (11):
  • [3] Secure Multiparty Computation
    Lindell, Yehuda
    COMMUNICATIONS OF THE ACM, 2021, 64 (01) : 86 - 96
  • [4] Secure Multiparty Multisets Computation
    Pan, Jiahao
    Dou, Jiawei
    International Journal of Network Security, 2023, 25 (03) : 425 - 430
  • [5] Secure multiparty computation of DNF
    Peng, Kun
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 254 - 268
  • [6] Secure Multiparty Computation of Approximations
    Feigenbaum, Joan
    Ishai, Yuval
    Malkin, Tal
    Nissim, Kobbi
    Strauss, Martin J.
    Wright, Rebecca N.
    ACM TRANSACTIONS ON ALGORITHMS, 2006, 2 (03) : 435 - 472
  • [7] Secure Multiparty Graph Computation
    Kukkala, Varsha Bhat
    Iyengar, S. R. S.
    Saini, Jaspal Singh
    2016 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS), 2016,
  • [8] Scalable secure multiparty computation
    Damgard, Ivan
    Ishai, Yuval
    ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 501 - 520
  • [9] Fairy Ring: Ubiquitous Secure Multiparty Computation Framework for Smartphone Applications
    Teruya, Tadanori
    Aoki, Yoshiki
    Sakuina, Jun
    PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 708 - 712
  • [10] Better Preprocessing for Secure Multiparty Computation
    Baum, Carsten
    Damgard, Ivan
    Toft, Tomas
    Zakarias, Rasmus
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 327 - 345