TY - GEN
T1 - Privacy-preserving practical Convex Hulls protocol
AU - Zhu, Youwen
AU - Huang, Liusheng
AU - Yang, Wei
AU - Chen, Zhili
AU - Li, Lingjun
AU - Yu, Zhenshan
AU - Luo, Yonglong
PY - 2008
Y1 - 2008
N2 - Secure Multi-party Computation has been a hot research topic of cryptograhy for about two decades, and the Convex Hulls problem is a special case of it. However, the precise convex hulls will certainly expose all vertexes and even bring about unfairness. Therefore the practical approximate convex hulls are in need. In this paper, we summarize and discuss the Convex Hulls problem, and then we present a more effective new protocol to compute the approximate convex hulls. Furthermore, we analyze the security, communication complexity and efficiency of the protocol, and compare the new scheme with other privacy-preserving convex hulls protocols through simulated experiments. It shows that our privacy-preserving approximate convex hulls protocol is more effective than the previous privacy-preserving ones, and the new protocol is practical enough in many situations. Perfectly keeping privacy preserving and eliminating unfairness are the great advantages of our scheme.
AB - Secure Multi-party Computation has been a hot research topic of cryptograhy for about two decades, and the Convex Hulls problem is a special case of it. However, the precise convex hulls will certainly expose all vertexes and even bring about unfairness. Therefore the practical approximate convex hulls are in need. In this paper, we summarize and discuss the Convex Hulls problem, and then we present a more effective new protocol to compute the approximate convex hulls. Furthermore, we analyze the security, communication complexity and efficiency of the protocol, and compare the new scheme with other privacy-preserving convex hulls protocols through simulated experiments. It shows that our privacy-preserving approximate convex hulls protocol is more effective than the previous privacy-preserving ones, and the new protocol is practical enough in many situations. Perfectly keeping privacy preserving and eliminating unfairness are the great advantages of our scheme.
UR - https://www.scopus.com/pages/publications/62749136258
U2 - 10.1109/FCST.2008.10
DO - 10.1109/FCST.2008.10
M3 - 会议稿件
AN - SCOPUS:62749136258
SN - 9780769535401
T3 - Proceedings - 2008 Japan-China Joint Workshop on Frontier of Computer Science and Technology, FCST 2008
SP - 10
EP - 16
BT - Proceedings - 2008 Japan-China Joint Workshop on Frontier of Computer Science and Technology, FCST 2008
T2 - 2008 Japan-China Joint Workshop on Frontier of Computer Science and Technology, FCST 2008
Y2 - 27 December 2008 through 28 December 2008
ER -