A Secure Scalar Product Protocol and Its Applications to Computational Geometry

نویسندگان

  • Bo Yang
  • Chung-Huang Yang
  • Yong Yu
  • Dan Xie
چکیده

A secure scalar product protocol is a type of specific SMC problem, and has found various applications in many areas such as privacy-preserving data mining, privacy-preserving cooperative statistical analysis, and privacy-preserving geometry computation. In this paper, we firstly extend to a solution of homomorphic-encryption based secure scalar product protocol such that it enables the scheme to be used in distributed decryption, and to deal with negative vectors. Secondly, we propose two-party secure computation of a public Boolean function on private inputs of each party. Thirdly, we describe two applications of our secure scalar product protocol to computational geometry: determining securely location of a point to a directed line segment, and conditional oblivious transfer based on the relation between a private point and a private directed line.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy-Preserving Computational Geometry Problems on Conic Sections

Privacy-preserving computational geometry is a special secure multi-party computation and has many applications. In recent years, many scholars have focused on privacy-preserving computational geometry problems which are based on circle and polygon. However, as a branch of computational geometry problems, the private-computing on conic sections must be considered. Consequently, we study secure ...

متن کامل

On the structural properties for the cross product of fuzzy numbers with applications

In the fuzzy arithmetic, the definitions of addition and multiplication of fuzzy numbers are based on Zadeh’s extension principle. From theoretical and practical points of view, this multiplication of fuzzy numbers owns several unnatural properties. Recently, to avoid this shortcoming, a new multiplicative operation of product type is introduced, the so-called cross-product of fuzzy numbers. Th...

متن کامل

Parleda: a Library for Parallel Processing in Computational Geometry Applications

ParLeda is a software library that provides the basic primitives needed for parallel implementation of computational geometry applications. It can also be used in implementing a parallel application that uses geometric data structures. The parallel model that we use is based on a new heterogeneous parallel model named HBSP, which is based on BSP and is introduced here. ParLeda uses two main lib...

متن کامل

Solution of Vacuum Field Equation Based on Physics Metrics in Finsler Geometry and Kretschmann Scalar

The Lemaître-Tolman-Bondi (LTB) model represents an inhomogeneous spherically symmetric universefilledwithfreelyfallingdustlikematterwithoutpressure. First,wehaveconsideredaFinslerian anstaz of (LTB) and have found a Finslerian exact solution of vacuum field equation. We have obtained the R(t,r) and S(t,r) with considering establish a new solution of Rµν = 0. Moreover, we attempttouseFinslergeo...

متن کامل

A Secure and Efficient Key Agreement Protocol Based on Certificateless Cryptography

Almost all the certificateless two-party authenticated key agreement (CTAKA) protocols found in the literature, suffer either serious security problems or inefficient performance that involves high computational costs. In this paper, we design a secure and efficient CTAKA protocol. Within the proposed CTAKA protocol, the KGC publishes the public keys of the users in a public directory (LDAP ser...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JCP

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2013