期刊文献+

Graham算法求解凸包问题中的隐私保护 被引量:4

Privacy-preserving in Graham algorithm for finding convex hulls
下载PDF
导出
摘要 凸包问题是构造其他几何形体的有效工具。保护私有信息的凸包求解问题是一个特殊的安全多方计算问题。基于安全多方计算的基础协议,设计了一个保护私有信息的凸包求解协议,解决了基于隐私保护的凸包求解问题,并讨论和分析了其安全性和正确性。 Convex hull is an effective tool to construct other geometric shapes.Privacy-preserving protocol for finding the convex hulls is a special case of secure multi-party computation problem.Based on some basic protocols of security multi-party computation,the paper designed a privacy-preserving protocol for finding the convex hulls to resolve the convex hull problem,it also discussed and analyzed the security and correctness of the protocol.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第36期130-133,共4页 Computer Engineering and Applications
基金 国家自然科学基金(No.60703071) 安徽省优秀青年科技基金项目(No.08040106806) 安徽省自然科学基金(No.070412043) 安徽高校省级自然科学研究重点项目(No.2006KJ024A)~~
关键词 隐私保护 安全多方计算 凸包 计算几何 privacy-preserving Security Multi-party Computation(SMC) convex hull computational geometry
  • 相关文献

参考文献24

  • 1Goldreich O.Foundations of cryptography :Volume Ⅱ.basic applications[M].Cambridge:Cambridge University Press,2004.
  • 2Yao A C.Protocols for secure computations[C]//Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, Chicago, USA, 1982 : 160-164.
  • 3Cachin C.Efficient private bidding and auctions with an oblivious third party[C]//Proceedings of the 6th ACM Conference on Computer and Communications Security, Singapore, 1999 : 120-127.
  • 4Yao A C.How to generate and exchange secrets[C]//Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, Toronto, Ontario, Canada, 1986 : 162-167.
  • 5Goldreich O,Micali S,Wigderson A.How to play any mental game[C]//Proceedings of the 19th Annual ACM Symposiumon Theory of Computing, New York, 1987 : 218-229.
  • 6Goldwasser S.Multi-party computations:Past and present[C]//Proceedings of the 16th Annual ACM Symposium on Principles of Distributed Computing,Santa Barbara,CA,USA,1997:1-6.
  • 7罗永龙,黄刘生,荆巍巍,徐维江.空间几何对象相对位置判定中的私有信息保护[J].计算机研究与发展,2006,43(3):410-416. 被引量:44
  • 8LUO Yonglong,HUANG Liusheng,CHEN Guoliang,SHEN Hong.Privacy-Preserving Distance Measurement and Its Applications[J].Chinese Journal of Electronics,2006,15(2):237-241. 被引量:15
  • 9LUO Yonglong,HUANG Liusheng,ZHONG Hong,CHEN Guoliang.A Secure Protocol for Determining Whether a Point is Inside a Convex Polygon[J].Chinese Journal of Electronics,2006,15(4):578-582. 被引量:18
  • 10Atallah M J,Du Wenliang.Secure multi-party computational geometry[C]//Lecture Notes in Computer Science 2125.Berlin: Springer, 2001 : 165-179.

二级参考文献42

共引文献139

同被引文献23

引证文献4

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部