Private Trajectory Intersection Testing: Is Garbled Circuit Better than Custom Protocols?

سال انتشار: 1400
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 480

فایل این مقاله در 10 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_IJE-34-4_012

تاریخ نمایه سازی: 6 اردیبهشت 1400

چکیده مقاله:

In this paper, two protocols are presented for private intersection detection of two moving objects’ trajectories. Assuming that the movement trajectory of an object can be described by a time-dependent polynomial function, the problem of finding the intersection points is simplified to the problem of finding the common roots of the corresponding polynomials. Thereafter, GrÖbner Basis is used to design a novel secure protocol of finding the common roots of the polynomials. Another protocol is also designed based on the distance computation of two trajectories’ curves. Moreover, we present the complexity analysis of the protocol for private trajectory intersection testing of two moving objects, which is based on GrÖbner Basis. Then, we compare its complexity by the garbled circuit-based protocol for Euclidean Distance Computation of l points. We also prove the security of our proposed protocol, which is based on the distance computation of two curves. Keywords: Private Trajectory Intersection Testing, GrÖbner Basis, Distance Computation, Complexity , Garbled Circuit, Euclidean Distance

کلیدواژه ها:

Private Trajectory Intersection Testing ، GrÖbner Basis ، Distance Computation ، complexity ، Garbled Circuit ، Euclidean Distance

نویسندگان

M. Dehghan

Department of Computer Engineering, Amirkabir University of Technology, Tehran, Iran

B. Sadeghiyan

Department of Computer Engineering, Amirkabir University of Technology, Tehran, Iran

E. Khosravian

Department of Mechanical Engineering, Payame Noor University, Tehran, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • 1.     Asadi Saeed Abad, F., and Hamidi, H., "An Architecture ...
  • 2.     Yao, A. C., "Protocols for secure computations", 23rd Annual ...
  • 3.     Goldreich, O., Micali, S., and Wigderson, A., "How to ...
  • 4.     Hemenway, B., Lu, S., Ostrovsky, R., and Welser IV, ...
  • 5.     Atallah, M. J., and Du, W., "Secure Multi-party Computational ...
  • 6.     Frikken, K. B., and Atallah, M. J., "Privacy preserving ...
  • 7.     Cheng, R., Zhang, Y., Bertino, E., and Prabhakar, S., ...
  • 8.     Mascetti, S., Freni, D., Bettini, C., Wang, X. S., ...
  • 9.     Zhu, H., Wang, F., Lu, R., Liu, F., Fu, ...
  • 10.   Zheng, Y., Li, M., Lou, W., and Hou, Y. ...
  • 11.   Järvinen, K., Kiss, Á., Schneider, T., Tkachenko, O., and ...
  • 12.   Pagnin, E., Gunnarsson, G., Talebi, P., Orlandi, C., and ...
  • 13.   Farokhi, F., Shames, I., and Johansson, K. H., "Private ...
  • 14.   Oleynikov, I., Pagnin, E., and Sabelfeld, A., "Where Are ...
  • 15.   Chor, B., Kushilevitz, E., Goldreich, O., and Sudan, M., ...
  • 16.   Siksnys, L., Thomsen, J. R., Šaltenis, S., and Yiu, ...
  • 17.   Šikšnys, L., Thomsen, J. R., Šaltenis, S., Yiu, M. ...
  • 18.   Zhong, G., Goldberg, I., and Hengartner, U., "Louis, Lester ...
  • 19.   Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., and ...
  • 20.   Chatterjee, S., Karabina, K., and Menezes, A., "A New ...
  • 21.   Magkos, E., Kotzanikolaou, P., Magioladitis, M., Sioutas, S., and ...
  • 22.   Kotzanikolaou, P., Patsakis, C., Magkos, E., and Korakakis, M., ...
  • 23.   Šeděnka, J., and Gasti, P., "Privacy-preserving distance computation and ...
  • 24.   Dehghan, M., and Sadeghiyan, B., "Privacy‐preserving collision detection of ...
  • 25.   Huang, Y., Evans, D., and Katz, J., "Private set ...
  • 26.   Bellare, M., Hoang, V. T., and Rogaway, P., "Foundations ...
  • 27.   Rabin, M. O., "How To Exchange Secrets with Oblivious ...
  • 28.   Yao, A. C.-C., "How to generate and exchange secrets", ...
  • 29.   Naor, M., and Pinkas, B., "Efficient oblivious transfer protocols", ...
  • 30.   Ishai, Y., Kilian, J., Nissim, K., and Petrank, E., ...
  • 31.   Lindell, Y., and Pinkas, B., "A Proof of Security ...
  • 32.   Cox, D. A., Little, J., and O’Shea, D., Ideals, ...
  • 33.   Li, R., and Wu, C., "An Unconditionally Secure Protocol ...
  • 34.   Zahur, S., Rosulek, M., and Evans, D., "Two Halves ...
  • 35.   Pinkas, B., Schneider, T., Smart, N. P., and Williams, ...
  • 36.   Kolesnikov, V., and Schneider, T., "Improved Garbled Circuit: Free ...
  • 37.   Kolesnikov, V., Mohassel, P., and Rosulek, M., "FleXOR: Flexible ...
  • نمایش کامل مراجع