Privacy-preserving Judgment of the Intersection for Convex Polygons

被引:2
|
作者
Yao, Yifei [1 ]
Ning, Shurong [1 ]
Tian, Miaomiao [2 ]
Yang, Wei [2 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing, Peoples R China
[2] Natl High Performance Comp Ctr Hefei, Hefei, Anhui, Peoples R China
关键词
STC; secret comparison protocol; privacypreserving geometric computation; polygonal intersection; polygonal union;
D O I
10.4304/jcp.7.9.2224-2231
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
As the basic issues of computational geometry, intersection and union of convex polygons can solve lots of problems, such as economy and military affairs. And privacy-preserving judgment of the intersection and union for convex polygons are most popular issues for information security. Traditional method of making the polygons public does not satisfy the requirements of personal privacy. In this paper, a method to compute intersection and union of convex polygons in secure two-party computation (STC) model has been considered, both proportionate partition and unproportionate partition cases are studied. Scan line algorithm is used to figure out the geometry matter, while secret comparison protocol is used for saving the privacy, a series of protocols for this matter is proposed, which combines computational geometry and secure multi-party computation (SMC) technique to achieve the functionality of cooperation calculation without leaking so much privacy. At last, the security, complexity and applicability analysis of the protocols are also discussed.
引用
收藏
页码:2224 / 2231
页数:8
相关论文
共 50 条
  • [21] Privacy-preserving two-party rational set intersection protocol
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    Informatica (Slovenia), 2012, 36 (03): : 277 - 286
  • [22] CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection
    Marconi, Luciana
    Conti, Mauro
    Di Pietro, Roberto
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (05) : 301 - 319
  • [23] Privacy-preserving boosting
    Sébastien Gambs
    Balázs Kégl
    Esma Aïmeur
    Data Mining and Knowledge Discovery, 2007, 14 : 131 - 170
  • [24] Privacy-preserving boosting
    Gambs, Sebastien
    Kegl, Balazs
    Aimeur, Esma
    DATA MINING AND KNOWLEDGE DISCOVERY, 2007, 14 (01) : 131 - 170
  • [25] Efficient and Privacy-Preserving Polygons Spatial Query Framework for Location-Based Services
    Hui, Zhu
    Liu, Fen
    Li, Hui
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (02): : 536 - 545
  • [26] Privacy-Preserving Dijkstra
    Ostrovsky, Benjamin
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT IX, 2024, 14928 : 74 - 110
  • [27] Privacy-Preserving Signals
    Strack, Philipp
    Yang, Kai Hao
    ECONOMETRICA, 2024, 92 (06) : 1907 - 1938
  • [28] Privacy-Preserving Polling
    Shasha, Dennis
    COMMUNICATIONS OF THE ACM, 2020, 63 (10) : 108 - +
  • [29] Privacy-Preserving WSDM
    Korolova, Aleksandra
    PROCEEDINGS OF THE TWELFTH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING (WSDM'19), 2019, : 4 - 4
  • [30] Privacy-Preserving Statistics
    Vaidya, Jaideep
    COMPUTER, 2018, 51 (09) : 8 - 9