Secure multiparty computation of solid geometric problems and their applications

被引:47
|
作者
Li, Shundong [1 ]
Wu, Chunying [1 ]
Wang, Daoshun [2 ]
Dai, Yiqi [2 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Peoples R China
[2] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Secure multiparty computation; Solid geometry; Protocol; Simulation paradigm; KEY AGREEMENT PROTOCOL;
D O I
10.1016/j.ins.2014.04.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure multiparty computation is an area of recent research in the international cryptographic community, and secure computational geometry is an essential field of secure multiparty computation. Most of the existing studies of secure multiparty computational geometric problems have focused on plane geometry, while very few have addressed solid geometry. Because solid geometry is an integral part of geometry and describes the real world better than plane geometry, research on secure computational solid geometry is appealing. Motivated by an interesting application, we first examine the problem of the secure multiparty computation of a tetrahedron, propose a solution, and prove that the solution is private using an accepted simulation paradigm. Using the solution to the tetrahedron problem as a building block, we further solve the secure multiparty computation of three other solid geometric problems, including the relationship between a point and a plane, the relationship between a line and a plane, and the relationship between two planes. We also demonstrate that the solutions to these problems are private. We analyze the computational and communication complexities of these solutions and show that the computational complexities are near or equal to the problems' minimum theoretical computational complexity and that the communication complexities are equal to the minimum theoretical communication complexity. Thus, these solutions are optimal. Finally, we show an interesting application of secure computational solid geometry. (C) 2014 Elsevier Inc. All rights reserved.
引用
下载
收藏
页码:401 / 413
页数:13
相关论文
共 50 条
  • [41] Application-Scale Secure Multiparty Computation
    Launchbury, John
    Archer, Dave
    DuBuisson, Thomas
    Mertens, Eric
    PROGRAMMING LANGUAGES AND SYSTEMS, 2014, 8410 : 8 - 26
  • [42] On Adaptively Secure Multiparty Computation with a Short CRS
    Cohen, Ran
    Peikert, Chris
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2016, 2016, 9841 : 129 - 146
  • [43] A Scripting Language for Automating Secure Multiparty Computation
    Chen, Kung
    Hsu, Tsan-sheng
    Liau, Churn-Jung
    Wang, Da-Wei
    2013 EIGHTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2013, : 127 - 134
  • [44] Secure Multiparty Quantum Computation for Summation and Multiplication
    Run-hua Shi
    Yi Mu
    Hong Zhong
    Jie Cui
    Shun Zhang
    Scientific Reports, 6
  • [45] Non-Interactive Secure Multiparty Computation
    Beimel, Amos
    Gabizon, Ariel
    Ishai, Yuval
    Kushilevitz, Eyal
    Meldgaard, Sigurd
    Paskin-Cherniaysky, Anat
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 387 - 404
  • [46] Bit Decomposition Protocols in Secure Multiparty Computation
    Laud, Peeter
    Pankova, Alisa
    WAHC'18: PROCEEDINGS OF THE 6TH WORKSHOP ON ENCRYPTED COMPUTING & APPLIED HOMOMORPHIC CRYPTOGRAPHY, 2018, : 37 - 48
  • [47] Secure Multiparty RAM Computation in Constant Rounds
    Garg, Sanjam
    Gupta, Divya
    Miao, Peihan
    Pandey, Omkant
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 491 - 520
  • [48] On 2-round secure multiparty computation
    Gennaro, R
    Ishai, Y
    Kushilevitz, E
    Rabin, T
    ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 178 - 193
  • [49] Leveraging Secure Multiparty Computation in the Internet of Things
    von Maltitz, Marcel
    Carle, Georg
    MOBISYS'18: PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2018, : 508 - 510
  • [50] Secure Multiparty Computation and Application in Machine Learning
    Guo J.
    Wang Q.
    Xu X.
    Wang T.
    Lin J.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (10): : 2163 - 2186