Private Trajectory Intersection Testing: Is Garbled Circuit Better than Custom Protocols?

نویسندگان

چکیده

In this paper, two protocols are presented for private intersection detection of moving objects’ trajectories. Assuming that the movement trajectory an object can be described by a time-dependent polynomial function, problem finding points is simplified to common roots corresponding polynomials. Thereafter, GrObner Basis used design novel secure protocol Another also designed based on distance computation trajectories’ curves. Moreover, we present complexity analysis testing objects, which Basis. Then, compare its garbled circuit-based Euclidean Distance Computation l points. We prove security our proposed protocol, Keywords: Private Trajectory Intersection Testing, Basis, Computation, Complexity , Garbled Circuit,

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?

Cryptographic protocols for Private Set Intersection (PSI) are the basis for many important privacy-preserving applications. Over the past few years, intensive research has been devoted to designing custom protocols for PSI based on homomorphic encryption and other public-key techniques, apparently due to the belief that solutions using generic approaches would be impractical. This paper explor...

متن کامل

Practical Private Set Intersection Protocols

The constantly increasing dependence on anytime-anywhere availability of data and the commensurately increasing fear of losing privacy motivate the need for privacy-preserving techniques. One interesting and common problem occurs when two parties need to privately compute an intersection of their respective sets of data. In doing so, one or both parties must obtain the intersection (if one exis...

متن کامل

Breaking and Fixing Private Set Intersection Protocols

A private set intersection protocol consists of two parties, a Sender and a Receiver, each with a secret input set. The protocol aims to have the Receiver output an intersection of the two sets while keeping the elements in the sets secret. This thesis thoroughly analyzes four recently published set intersection protocols, where it explains each protocol and checks whether it satisfies its corr...

متن کامل

On the performance of certain Private Set Intersection protocols∗

Private Set Intersection (PSI) is a useful cryptographic primitive that allows two parties (client and server) to interact based on their respective (private) input sets, in such a way that client obtains nothing other than the set intersection, while server learns nothing beyond client set size. This paper considers one PSI construct from [DT10] and reports on its optimized implementation and ...

متن کامل

Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model

Private Set Intersection (PSI) protocols allow one party (“client”) to compute an intersection of its input set with that of another party (“server”), such that the client learns nothing other than the set intersection and the server learns nothing beyond client input size. Prior work yielded a range of PSI protocols secure under different cryptographic assumptions. Protocols operating in the s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of engineering. Transactions A: basics

سال: 2021

ISSN: ['1728-1431']

DOI: https://doi.org/10.5829/ije.2021.34.04a.12