北京邮电大学学报

  • EI核心期刊

北京邮电大学学报 ›› 2008, Vol. 31 ›› Issue (2): 72-75.doi: 10.13190/jbupt.200802.72.liuw

• 论文 • 上一篇    下一篇

保护私有信息的点线关系判定协议及其应用

刘 文1,3,罗守山2,3,陈 萍4   

  1. 1. 北京邮电大学 计算机科学与技术学院, 北京100876; 2. 北京邮电大学 软件学院, 北京100876; 3. 西安电子科技大学 综合业务网理论及关键技术国家重点实验室, 西安 710071; 4. 北京邮电大学 电信工程学院, 北京100876
  • 收稿日期:2007-06-13 修回日期:1900-01-01 出版日期:2008-04-28 发布日期:2008-04-28
  • 通讯作者: 刘 文

Privacy-Preserving Point-Line Relation Determination Protocol and Its Applications

LIU Wen1,3, LUO Shou-shan2,3, CHEN Ping4   

  1. . School of Computer Science and Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China; 2. School of Software Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China; 3. National Key Laboratory of Integrated Service Networks, Xidian University, Xi’an 710071,China; 4.School of Telecommunication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China;
  • Received:2007-06-13 Revised:1900-01-01 Online:2008-04-28 Published:2008-04-28
  • Contact: LIU Wen

摘要:

在半诚实模型下利用加法同态加密体制设计了一个保护私有信息的点线关系判定协议,并且利用上述协议设计了保护私有信息的线段相交判定问题和保护私有信息的点包含判定问题的解决方案。保护私有信息的点线关系判定协议可以保密地判断点在直线正侧、负侧、在直线上,保护私有信息的线段相交判定协议可以保密地判断不同参与方拥有的直线是否相交,保护私有信息的点包含判定协议可以保密判断不同参与方拥有点和多边形之间的包含关系;分析和证明了这些协议的正确性、安全性和复杂性。

关键词: 安全多方计算, 计算几何, 点线关系判定, 加法同态加密体制

Abstract:

A privacy-preserving point-line relation determination protocol based on additive homomorphism encryption is developed in semi-honest model. The privacy-preserving point-line relation determination protocol can be used to solve many privacy-preserving computational geometry problems, such as segments intersection problem and point inclusion problem. The privacy-preserving point-line relation determination protocol can be also used to determine either the point is at the positive side, negative side, or on the line privately. Further more, the privacy-preserving segments intersection protocol can be used to determine two lines supplied by different users intersect securely; and the privacy-preserving point inclusion protocol can be used to determine the relation of a point and a polygon supplied by different users. Finally, the correctness, security and efficiency of these protocols are analyzed.

Key words: secure multi-party computation, computational geometry, point-line relation determination, additive homomorphic encryption

中图分类号: