Privacy-preserving practical Convex Hulls protocol

  • Youwen Zhu*
  • , Liusheng Huang
  • , Wei Yang
  • , Zhili Chen
  • , Lingjun Li
  • , Zhenshan Yu
  • , Yonglong Luo
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

Secure Multi-party Computation has been a hot research topic of cryptograhy for about two decades, and the Convex Hulls problem is a special case of it. However, the precise convex hulls will certainly expose all vertexes and even bring about unfairness. Therefore the practical approximate convex hulls are in need. In this paper, we summarize and discuss the Convex Hulls problem, and then we present a more effective new protocol to compute the approximate convex hulls. Furthermore, we analyze the security, communication complexity and efficiency of the protocol, and compare the new scheme with other privacy-preserving convex hulls protocols through simulated experiments. It shows that our privacy-preserving approximate convex hulls protocol is more effective than the previous privacy-preserving ones, and the new protocol is practical enough in many situations. Perfectly keeping privacy preserving and eliminating unfairness are the great advantages of our scheme.

Original languageEnglish
Title of host publicationProceedings - 2008 Japan-China Joint Workshop on Frontier of Computer Science and Technology, FCST 2008
Pages10-16
Number of pages7
DOIs
StatePublished - 2008
Externally publishedYes
Event2008 Japan-China Joint Workshop on Frontier of Computer Science and Technology, FCST 2008 - Nagasaki, Japan
Duration: 27 Dec 200828 Dec 2008

Publication series

NameProceedings - 2008 Japan-China Joint Workshop on Frontier of Computer Science and Technology, FCST 2008

Conference

Conference2008 Japan-China Joint Workshop on Frontier of Computer Science and Technology, FCST 2008
Country/TerritoryJapan
CityNagasaki
Period27/12/0828/12/08

Fingerprint

Dive into the research topics of 'Privacy-preserving practical Convex Hulls protocol'. Together they form a unique fingerprint.

Cite this