Secure multiparty computation of solid geometric problems and their applications

被引:47
|
作者
Li, Shundong [1 ]
Wu, Chunying [1 ]
Wang, Daoshun [2 ]
Dai, Yiqi [2 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Peoples R China
[2] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Secure multiparty computation; Solid geometry; Protocol; Simulation paradigm; KEY AGREEMENT PROTOCOL;
D O I
10.1016/j.ins.2014.04.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure multiparty computation is an area of recent research in the international cryptographic community, and secure computational geometry is an essential field of secure multiparty computation. Most of the existing studies of secure multiparty computational geometric problems have focused on plane geometry, while very few have addressed solid geometry. Because solid geometry is an integral part of geometry and describes the real world better than plane geometry, research on secure computational solid geometry is appealing. Motivated by an interesting application, we first examine the problem of the secure multiparty computation of a tetrahedron, propose a solution, and prove that the solution is private using an accepted simulation paradigm. Using the solution to the tetrahedron problem as a building block, we further solve the secure multiparty computation of three other solid geometric problems, including the relationship between a point and a plane, the relationship between a line and a plane, and the relationship between two planes. We also demonstrate that the solutions to these problems are private. We analyze the computational and communication complexities of these solutions and show that the computational complexities are near or equal to the problems' minimum theoretical computational complexity and that the communication complexities are equal to the minimum theoretical communication complexity. Thus, these solutions are optimal. Finally, we show an interesting application of secure computational solid geometry. (C) 2014 Elsevier Inc. All rights reserved.
引用
下载
收藏
页码:401 / 413
页数:13
相关论文
共 50 条
  • [21] Secure Multiparty Computation Goes Live
    Bogetoft, Peter
    Christensen, Dan Lund
    Damgard, Ivan
    Geisler, Martin
    Jakobsen, Thomas
    Kroigaard, Mikkel
    Nielsen, Janus Dam
    Nielsen, Jesper Buns
    Nielsen, Jurt
    Pagter, Jakob
    Schwartzbach, Michael
    Toft, Tomas
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2009, 5628 : 325 - +
  • [22] Secure multiparty computation of a comparison problem
    Liu, Xin
    Li, Shundong
    Liu, Jian
    Chen, Xiubo
    Xu, Gang
    SPRINGERPLUS, 2016, 5
  • [23] Secure Multiparty Computation with Sublinear Preprocessing
    Boyle, Elette
    Gilboa, Niv
    Ishai, Yuval
    Nof, Ariel
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT I, 2022, 13275 : 427 - 457
  • [24] General secure multiparty computation - Preface
    Goldreich, O
    JOURNAL OF CRYPTOLOGY, 2000, 13 (01) : 1 - 7
  • [25] Secure Multiparty Computation Using Secure Virtual Machines
    Miladinovic, Danko
    Milakovic, Adrian
    Vukasovic, Maja
    Stanisavljevic, Zarko
    Vuletic, Pavle
    ELECTRONICS, 2024, 13 (05)
  • [26] On the Message Complexity of Secure Multiparty Computation
    Ishai, Yuval
    Mittal, Manika
    Ostrovsky, Rafail
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 698 - 711
  • [27] Secure multiparty computation in cloud computing
    Jiang H.
    Xu Q.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (10): : 2152 - 2162
  • [28] Basic constructions of secure multiparty computation
    Laud, Peeter
    Pankova, Alisa
    Kamm, Liina
    Veeningen, Meilof
    Cryptology and Information Security Series, 2015, 13 : 1 - 25
  • [29] Secure multiparty computation for comparator networks
    Morohashi, Gembu
    Chida, Koji
    Hirota, Keiichi
    Kikuchi, Hiroaki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (09) : 2349 - 2355
  • [30] Efficient Secure Multiparty Subset Computation
    Zhou, Sufang
    Li, Shundong
    Dou, Jiawei
    Geng, Yaling
    Liu, Xin
    SECURITY AND COMMUNICATION NETWORKS, 2017,