We use cookies to improve your experience with our site.
Yong-Long Luo, Liu-Sheng Huang, Hong Zhong. Secure Two-Party Point-Circle Inclusion Problem[J]. Journal of Computer Science and Technology, 2007, 22(1): 88-91.
Citation: Yong-Long Luo, Liu-Sheng Huang, Hong Zhong. Secure Two-Party Point-Circle Inclusion Problem[J]. Journal of Computer Science and Technology, 2007, 22(1): 88-91.

Secure Two-Party Point-Circle Inclusion Problem

  • Privacy-preserving computational geometry is a specialsecure multi-party computation and has many applications. Previousprotocols for determining whether a point is inside a circle are notsecure enough. We present a two-round protocol for computing thedistance between two private points and develop a more efficientprotocol for the point-circle inclusion problem based on the distanceprotocol. In comparison with previous solutions, our protocol not onlyis more secure but also reduces the number of communication rounds andthe number of modular multiplications significantly.
  • loading

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return