Secure Two-Party Computational Geometry

被引:0
|
作者
Shun-Dong Li
Yi-Qi Dai
机构
[1] Tsinghua University,Department of Computer Science and Technology
关键词
secure multi-party computation; oblivious transfer; millionaire problem; secure computation geometry; protocol;
D O I
暂无
中图分类号
学科分类号
摘要
Secure Multi-party Computation has been a research focus in international cryptographic community in recent years. In this paper the authors investigate how some computational geometric problems could be solved in a cooperative environment, where two parties need to solve a geometric problem based on their joint data, but neither wants to disclose its private data to the other party. These problems are the distance between two private points, the relation between a private point and a circle area, the relation between a private point and an ellipse area and the shortest distance between two point sets. The paper gives solutions to these specific geometric problems, and in doing so a building block is developed, the protocol for the distance between two private points, that is also useful in the solutions to other geometric problems and combinatorial problems.
引用
收藏
页码:258 / 263
页数:5
相关论文
共 50 条
  • [1] Secure two-party computational geometry
    Li, SD
    Dai, YQ
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2005, 20 (02) : 258 - 263
  • [2] Geometry of Secure Two-party Computation
    Basu, Saugata
    Khorasgani, Hamidreza Amini
    Maji, Hemanta K.
    Nguyen, Hai H.
    2022 IEEE 63RD ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2022, : 1035 - 1044
  • [3] Completeness in two-party secure computation: A computational view
    Harnik, Danny
    Naor, Moni
    Reingold, Omer
    Rosen, Alon
    JOURNAL OF CRYPTOLOGY, 2006, 19 (04) : 521 - 552
  • [4] Completeness in Two-Party Secure Computation: A Computational View
    Danny Harnik
    Moni Naor
    Omer Reingold
    Alon Rosen
    Journal of Cryptology, 2006, 19 : 521 - 552
  • [5] Secure Two-Party Computation Is Practical
    Pinkas, Benny
    Schneider, Thomas
    Smart, Nigel P.
    Williams, Stephen C.
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 250 - +
  • [6] On the Power of Secure Two-Party Computation
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 397 - 429
  • [7] Secrecy of two-party secure computation
    Chiang, YT
    Wang, DW
    Liau, CJ
    Hsu, TS
    DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 114 - 123
  • [8] Efficient Secure Two-Party Exponentiation
    Yu, Ching-Hua
    Chow, Sherman S. M.
    Chung, Kai-Min
    Liu, Feng-Hao
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 17 - +
  • [9] On the Power of Secure Two-Party Computation
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    JOURNAL OF CRYPTOLOGY, 2020, 33 (01) : 271 - 318
  • [10] On the Power of Secure Two-Party Computation
    Carmit Hazay
    Muthuramakrishnan Venkitasubramaniam
    Journal of Cryptology, 2020, 33 : 271 - 318