A Secure Protocol for Point-Segment Position Problem

Privacy Preserving Computation Geometry is an important direction in the application of Secure Multi-party Computation and contains many research subjects, such as intersection problem, point-inclusion problem, convex hull, rang searching and so on. Particularly, point-inclusion problem is of great practical significance in our daily life. In this paper, we will devote our attention to the point-segment position problem in point-inclusion and aim to determine the relationship of a point and a segment. In our solution, we present a concise secure protocol based on two basic protocols, secure scalar product protocol and secure comparison protocol. Compared with precious solutions, which may disclose at least one inside point, our protocol performs better in terms of preserving privacy. It will not reveal any inside point, which is crucially significant in some special occasion.

[1]  Wenliang Du,et al.  Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.

[2]  Artak Amirbekyan,et al.  A New Efficient Privacy-Preserving Scalar Product Protocol , 2007, AusDM.

[3]  Wen-Guey Tzeng,et al.  An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption , 2005, ACNS.

[4]  Yehuda Lindell,et al.  Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation , 2001, Journal of Cryptology.

[5]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[6]  Niklaus Wirth,et al.  Algorithms and Data Structures , 1989, Lecture Notes in Computer Science.

[7]  Christian Cachin,et al.  Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.

[8]  Wenliang Du,et al.  Building decision tree classifier on private data , 2002 .

[9]  Yang Wei,et al.  Efficient Secure Protocols to Determine Whether a Point is inside a Convex Hull , 2009, 2009 International Symposium on Information Engineering and Electronic Commerce.

[10]  Tsan-sheng Hsu,et al.  Toward Empirical Aspects of Secure Scalar Product , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[11]  Luo,et al.  A Secure Protocol for Determining Whether a Point is Inside a Convex Polygon , 2006 .

[12]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[13]  Stefan Katzenbeisser,et al.  A secure multidimensional point inclusion protocol , 2007, MM&Sec.

[14]  Justin Zhan,et al.  Towards Empirical Aspects of Secure Scalar Product , 2008 .

[15]  Hong Shen,et al.  A scheme for testing privacy state in pervasive sensor networks , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[16]  Ananth Grama,et al.  An efficient protocol for Yao's millionaires' problem , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[17]  Wenliang Du,et al.  Secure Multi-party Computational Geometry , 2001, WADS.

[18]  K. C. Hui A robust point inclusion algorithm for regions bounded by parametric curve segments , 1997, Comput. Aided Des..