Improvement of a secure convex hull two-party computation protocol

被引:0
作者
Wenjie Z. [1 ]
Mingxing H. [1 ]
机构
[1] School of Mathematics and Computer Engineering, Xihua University, Chengdu
关键词
Convex hull; Quick method; Secure multi-party computation;
D O I
10.4156/jcit.vol5.issue3.4
中图分类号
学科分类号
摘要
In 2008, Wang et. al. first investigate a sort of specific secure multi-party computation--secure convex hull two-party computation, and construct two protocols based on Gift wrapping method and Quick method separately. However, there are some errors in his protocol based on Quick method. This paper proposes two effective improved protocols. In addition, we analyze and compare security, computational complexity and communicational complexity about these two improved protocols.
引用
收藏
页码:24 / 30
页数:6
相关论文
共 13 条
[1]  
Yao A.C., Protocols for secure computations, Proceedings of 23rd Annual IEEE Symposium of Foundations of Computer Science, pp. 160-164, (1982)
[2]  
Goldreich O., Micali S., Wigderson A., How to play any mental game, Proceedings of The 19th Symposium On Theory of Computing (STOC), pp. 218-229, (1987)
[3]  
Freedman M., Nissim K., Pinkas B., Efficient private matching and set intersection, Proceedings of Eurocrypt 2004, pp. 1-19, (2004)
[4]  
Lindell Y., Pinkas B., Privacy preserving data mining, Journal of Cryptology, 15, pp. 177-206, (2002)
[5]  
Cachin C., Efficient private bidding and auction with an obvious third party, Proceeding of The 6th ACM Conference On Computer and Communication Security, pp. 120-127, (1999)
[6]  
Atallah J., Du W.L., Secure multi-party computational geometry, 7th International Workshop On Algorithms and Data Structures, pp. 165-179, (2001)
[7]  
Wang Q., Luo Y., Huang L., Privacy preserving protocols for finding the convex hulls, ARES'08, Washington IEEE Computer Society, pp. 727-732, (2008)
[8]  
Goldreich O., Foundations of Cryptography: Basic Applications, (2004)
[9]  
Du W., Atalla M.J., Secure multi-party computation problems and their applications: A review and open problems, New Security Paradigms Workshop, pp. 11-20, (2001)
[10]  
Chen T.M., Optimal output-sensitive convex hull algorithms in two and three dimensions, Discrete Computational Geometry, 16, pp. 361-368, (1996)