Privacy-preserving two-party computation of line segment intersection

被引:0
作者
Sheidani, Sorour [1 ]
Zarei, Alireza [1 ]
机构
[1] Sharif Univ Technol, Dept Math Sci, Tehran, Iran
关键词
Segment intersection; Multi-party computation; Passive adversary; Private segment intersection; Secure computational geometry; SECURE MULTIPARTY COMPUTATION;
D O I
10.1007/s10207-024-00895-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
By considering maps and routes as sequences of line segments, their intersections can be computed to find out useful information like the possibility of collision in a military area where the parties do not trust each other. At the first glance, finding the coordinates of the intersections is seemed impossible to be solved securely since having coordinates of two intersection points on the same line reveals the passing line. In this paper, we solve this problem by suggesting a secure two-party protocol in presence of passive adversaries. Additionally, regarding the fact that in some cases, the fixedness of the inputs of the parties in classic security models is an unrealistic assumption, we define the new concept of input-adaptive security and show that our method is secure against such an adversary who is able to select his inputs adaptively. In addition to serve different approaches like oblivious transfer and sometimes homomorphic encryption, we also employ some tricks to prevent the distribution of harmful information between specific parties to achieve our intended security level. We provide formal proofs to show the security of our protocol. Time complexity analysis and implementations show that our protocol finds the intersections in feasible time of O(nlogn)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathcal {O}}(n \log n)$$\end{document} and indicate that our protocol is as good as the unsecure optimal method of line segment intersection computation. In comparison, previous methods require O(n2)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$O(n<^>2)$$\end{document} to only detect the existence of intersection between two sets of n line segments and are unable to find the coordinates of the intersections.
引用
收藏
页码:3415 / 3432
页数:18
相关论文
共 37 条
[1]  
Atallah MJ, 2001, LECT NOTES COMPUT SC, V2125, P165
[2]  
BENTLEY JL, 1979, IEEE T COMPUT, V28, P643, DOI 10.1109/TC.1979.1675432
[3]   Improved Private Set Intersection for Sets with Small Entries [J].
Bui, Dung ;
Couteau, Geoffroy .
PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT II, 2023, 13941 :190-220
[4]  
Cramer R, 2000, LECT NOTES COMPUT SC, V1807, P316
[5]  
Damgård I, 2012, LECT NOTES COMPUT SC, V7417, P643
[6]  
de Berg Mark, 2008, COMPUTATIONAL GEOMET, V3rd, DOI DOI 10.1007/978-3-540-77974-21
[7]  
de Floriani L, 2000, HANDBOOK OF COMPUTATIONAL GEOMETRY, P333, DOI 10.1016/B978-044482537-7/50008-5
[8]   Privacy-preserving collision detection of moving objects [J].
Dehghan, Motahareh ;
Sadeghiyan, Babak .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (03)
[9]  
Fang L., 2018, INT J NETW SECUR, V20, P1175
[10]  
Frikken K.B., 2004, Proceedings of the 2004 ACM workshop on privacy in the electronic society, P8, DOI DOI 10.1145/1029179.1029182