通信学报 ›› 2013, Vol. 34 ›› Issue (1): 30-42.doi: 1000-436X(2013)01-0030-13

• 学术论文 • 上一篇    下一篇

安全两方线段求交协议及其在保护隐私凸包交集中的应用

孙茂华1,2,罗守山1,2,3,辛阳1,2,杨义先1,2   

  1. 1 北京邮电大学 信息安全中心,北京100876
    2 北京邮电大学 灾备技术国家工程实验室,北京100876
    3 北京安码科技有限公司,北京100876
  • 出版日期:2013-01-25 发布日期:2017-06-13
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目

Secure two-party line segments intersection scheme and its application in privacy-preserving convex hull intersection

Mao-hua SUN1,2,Shou-shan LUO1,2,3,Yang XIN1,2,Yi-xian YANG1,2   

  1. 1 Information Security Center Beijing University of Posts and Telecommunications,Beijing 100876,China;
    2 National Engineering Laboratory for Disaster Backup and Recovery,Beijing University of Posts and Telecommunications,Beijing 100876,China
    3 Beijing Safe-Code Technology Co.,Ltd.,Beijing 100876,China
  • Online:2013-01-25 Published:2017-06-13
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China

摘要:

研究了现有安全多方计算几何协议,提出了安全多方计算几何的模型和框架,从数学模型、安全模型和通信模型 3个维度展开描述。针对现有安全两方线段关系判定协议都忽略求解交点坐标的问题,在半诚实模型下基于Paillier同态加密技术提出了安全两方线段求交协议,使用Goldreich证明法进行了理论安全性分析,并在恶意模型下进行了推广。分析结果表明,该半诚实模型下的算法在效率上优于现有算法。作为安全两方线段求交协议的应用,结合 O’Rourke 算法提出了保护隐私的凸包求交集协议,弥补了安全计算几何领域仅实现了凸包并集算法的缺陷。

关键词: 密码学, 安全多方计算几何, 安全两方线段求交, 保护隐私, 凸包交集

Abstract:

The model and framework of secure multi-party computational geometry were presented based on the existing protocols.The new framework has three dimensions,the math model,the security model and the communication model.Using the new model and framework,a secure two-party line segments intersection protocol based on Paillier homomorphic encryption scheme is proposed.This protocol solves the problem that the existing secure two party intersect-determination schemes of line segments cannot output the exact coordinates of the intersection.The security of the protocol is demonstrated using Goldreich method.The results show that this protocol has better efficiency than the existing ones.In addition,the secure two-party line segments intersection in malicious model is also designed.As an application,a privacy-preserving convex hull intersection protocol is proposed based on the O’Rourke scheme.This application makes up for the gap in privacy-preserving convex hull intersection protocol in the area of secure multi-party computational geometry.

Key words: cryptography, secure multi-party computational geometry, secure two-party line segments intersection scheme, privacy-preserving, convex hull intersection scheme

No Suggested Reading articles found!