通信学报 ›› 2016, Vol. 37 ›› Issue (4): 87-95.doi: 10.11959/j.issn.1000-436x.2016075

• 学术论文 • 上一篇    下一篇

保护私有信息的点包含协议研究

张静1,2,3,罗守山2,杨义先1,2,辛阳2   

  1. 1 北京交通大学计算机与信息技术学院,北京100044
    2 北京邮电大学信息安全中心,北京100876
    3 河南理工大学计算机科学与技术学院,河南 焦作454000
  • 出版日期:2016-04-25 发布日期:2016-04-26
  • 基金资助:
    国家自然科学基金资助项目

Research on the privacy-preserving point-in-polygon protocol

Jing ZHANG1,2,3,Shou-shan LUO2,Yi-xian YANG1,2,Yang XIN2   

  1. 1 School of Computer and Information Technology,Beijing Jiaotong University,Beijing 100044, China
    2 Information Security Center,Beijing University of Posts and Telecommunications, Beijing 100876, China
    3 College of Computer Science and Technology, Henan Polytechnic University, Jiaozuo 454000, China
  • Online:2016-04-25 Published:2016-04-26
  • Supported by:
    The National Natural Science Foundation of China

摘要:

摘 要:对现有保护私有信息的点包含协议进行研究,针对算法复杂度高、协议本身的的局限性等问题,在半诚实模型下,提出一种保护隐私的判断点与凸包位置关系协议。首先,利用OT n1与矢量的几何性质,将传统的点线位置判断问题扩展,设计一种茫然安全点线位置关系判断协议;然后,将此协议作为基础协议,结合安全二分检索法提出最终解决方案。利用 Goldreich 证明法对协议进行安全性证明,同时分析协议的正确性与算法复杂度。分析结果表明,协议在效率上优于现有方案,并具有可扩展性。

关键词: 点包含, 茫然点线关系, 隐私保护, 安全多方几何计算

Abstract:

A privacy-preserving point-in-polygon protocol was proposed under semi-honest model, to deal with the prob-lem of high complexity and limitation of the existing protocols. First, an blivious point-line protocol was designed by extending the traditional point-line protocol, making the use of 1-out-n oblivious transfer and the geometric properties of the vector. Then, based on this protocol and combined with the secure binary search protocol, the final solution was put forward. The security of the protocol was proved with ich method. Meanwihle, the validity and the complexity of the protocol were also be analyzed. It is shown that this new protocol gets the advantage over the existing one in terms of efficiency and enjoys excellent expandability.

Key words: point-in-polygon, oblivious point-line protocol, privacy-preserving, secure multi-party geometry

No Suggested Reading articles found!