A Secure Multidimensional Point Inclusion Protocol

被引:0
作者
Ramon Troncoso-Pastoriza, Juan [1 ]
Katzenbeisser, Stefan [1 ]
Celik, Mehmet [1 ]
Lemma, Aweke [1 ]
机构
[1] Univ Vigo, Signal Theory & Commun Dept, Vigo 36310, Spain
来源
MM&SEC'07: PROCEEDINGS OF THE MULTIMEDIA & SECURITY WORKSHOP 2007 | 2007年
关键词
Signal Processing in the Encrypted Domain; Secure Multiparty Computation; Homomorphic Encryption; Computational Geometry; Point Inclusion;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Signal processing in the encrypted domain combines typical signal processing operations and cryptographic primitives to ensure security in applications involving mutually distrusting participants. Several such applications reduce to a multi-dimensional point, inclusion problem where two participants decide whether a point known to the first lies inside a region specified by the second. In a secure solution, neither party gains knowledge about the other's input. For instance; in biometric authentication the client can prove his identity without disclosing his biometric. In this paper; we present a new primitive for securely solving the multidimensional point inclusion problem. Using this primitive, we first propose an efficient and provably secure protocol that solves the problem for art N-dimensional convex region bounded with hyperplanes. We subsequently extend the protocol to inclusion in multiple hyperellipsoidal regions. Considering possible reduction strategies such as input packing; we analyze the complexity of both protocols.
引用
收藏
页码:109 / 119
页数:11
相关论文
共 22 条
  • [1] [Anonymous], 2000, Geometry, Spinors and Applications
  • [2] Atallah MJ, 2001, LECT NOTES COMPUT SC, V2125, P165
  • [3] Boudot F, 2000, LECT NOTES COMPUT SC, V1807, P431
  • [4] Brinkman R, 2004, LECT NOTES COMPUT SC, V3178, P18
  • [5] POINT LOCATION AMONG HYPERPLANES AND UNIDIRECTIONAL RAY-SHOOTING
    CHAZELLE, B
    FRIEDMAN, J
    [J]. COMPUTATIONAL GEOMETRY-THEORY AND APPLICATIONS, 1994, 4 (02): : 53 - 62
  • [6] Cramer R, 2001, LECT NOTES COMPUT SC, V2045, P280
  • [7] Damgård I, 2002, LECT NOTES COMPUT SC, V2501, P125
  • [8] Damgård I, 2001, LECT NOTES COMPUT SC, V1992, P119
  • [9] DESMEDT Y, 1989, P CRYPTO 89, P307
  • [10] Goethals B, 2004, LECT NOTES COMPUT SC, V3506, P104