A Secure Scalar Product Protocol and Its Applications to Computational Geometry
نویسندگان
چکیده
A secure scalar product protocol is a type of specific SMC problem, and has found various applications in many areas such as privacy-preserving data mining, privacy-preserving cooperative statistical analysis, and privacy-preserving geometry computation. In this paper, we firstly extend to a solution of homomorphic-encryption based secure scalar product protocol such that it enables the scheme to be used in distributed decryption, and to deal with negative vectors. Secondly, we propose two-party secure computation of a public Boolean function on private inputs of each party. Thirdly, we describe two applications of our secure scalar product protocol to computational geometry: determining securely location of a point to a directed line segment, and conditional oblivious transfer based on the relation between a private point and a private directed line.
منابع مشابه
Privacy-Preserving Computational Geometry Problems on Conic Sections
Privacy-preserving computational geometry is a special secure multi-party computation and has many applications. In recent years, many scholars have focused on privacy-preserving computational geometry problems which are based on circle and polygon. However, as a branch of computational geometry problems, the private-computing on conic sections must be considered. Consequently, we study secure ...
متن کاملOn the structural properties for the cross product of fuzzy numbers with applications
In the fuzzy arithmetic, the definitions of addition and multiplication of fuzzy numbers are based on Zadeh’s extension principle. From theoretical and practical points of view, this multiplication of fuzzy numbers owns several unnatural properties. Recently, to avoid this shortcoming, a new multiplicative operation of product type is introduced, the so-called cross-product of fuzzy numbers. Th...
متن کاملParleda: a Library for Parallel Processing in Computational Geometry Applications
ParLeda is a software library that provides the basic primitives needed for parallel implementation of computational geometry applications. It can also be used in implementing a parallel application that uses geometric data structures. The parallel model that we use is based on a new heterogeneous parallel model named HBSP, which is based on BSP and is introduced here. ParLeda uses two main lib...
متن کاملSolution of Vacuum Field Equation Based on Physics Metrics in Finsler Geometry and Kretschmann Scalar
The Lemaître-Tolman-Bondi (LTB) model represents an inhomogeneous spherically symmetric universefilledwithfreelyfallingdustlikematterwithoutpressure. First,wehaveconsideredaFinslerian anstaz of (LTB) and have found a Finslerian exact solution of vacuum field equation. We have obtained the R(t,r) and S(t,r) with considering establish a new solution of Rµν = 0. Moreover, we attempttouseFinslergeo...
متن کاملA Secure and Efficient Key Agreement Protocol Based on Certificateless Cryptography
Almost all the certificateless two-party authenticated key agreement (CTAKA) protocols found in the literature, suffer either serious security problems or inefficient performance that involves high computational costs. In this paper, we design a secure and efficient CTAKA protocol. Within the proposed CTAKA protocol, the KGC publishes the public keys of the users in a public directory (LDAP ser...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JCP
دوره 8 شماره
صفحات -
تاریخ انتشار 2013