Skip to main content

A Secure Protocol for Point-Segment Position Problem

  • Conference paper
Book cover Web Information Systems and Mining (WISM 2010)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6318))

Included in the following conference series:

Abstract

Privacy Preserving Computation Geometry is an important direction in the application of Secure Multi-party Computation and contains many research subjects, such as intersection problem, point-inclusion problem, convex hull, rang searching and so on. Particularly, point-inclusion problem is of great practical significance in our daily life. In this paper, we will devote our attention to the point-segment position problem in point-inclusion and aim to determine the relationship of a point and a segment. In our solution, we present a concise secure protocol based on two basic protocols, secure scalar product protocol and secure comparison protocol. Compared with precious solutions, which may disclose at least one inside point, our protocol performs better in terms of preserving privacy. It will not reveal any inside point, which is crucially significant in some special occasion.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yao, A.C.: Protocols for secure computations. In: Proceedings of the 23th Annual IEEE Symposium on Foundations of Computer Science, pp. 160–164. IEEE Computer Society Press, Los Alamitos (1982)

    Google Scholar 

  2. Goldreich, O., Micali, S., Wigderson, A.: How to play mental game. In: Proceedings of the 19th ACM Symposium on Theory of Computing (STOC), pp. 218–229. ACM Press, New York (1987)

    Google Scholar 

  3. Du, W., Atallah, M.J.: Secure multi-party computation problems and their applications: A review and open problems. In: Proceedings of New Security Paradigms Workshop, Cloudcroft, New Mexico, USA, pp. 11–20 (2001)

    Google Scholar 

  4. Goldreich, O.: Secure multi-party computation. (manuscript version 1.3) (2002), http://theory.lcs.mit.edu/~oded

  5. Luo, Y., Huang, L., Zhong, H., et al.: A Secure protocol for determining whether a point is inside a convex polygon. Chinese Journal of Electronics 15(4), 578–582 (2006)

    Google Scholar 

  6. Lindell, Y.: Parallel coin-tossing and constant-round secure two-party computation. Journal of Cryptology 16(3), 143–184 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  7. Atllah, M.J., Du, W.: Secure multi-party computation on geometry. In: Dehne, F., Sack, J.-R., Tamassia, R. (eds.) WADS 2001. LNCS, vol. 2125, pp. 165–179. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  8. Ramon, J., Katzenbesser, S.: A secure multimensional point inclusion protocol. In: MM&Sec 2007, Texas, USA, pp. 109–120. ACM, New York (2007)

    Google Scholar 

  9. Sang, Y., Shen, H.: A scheme for testing privacy state in perasive sensor network. In: NINA 2005 (2005)

    Google Scholar 

  10. Hui, K.C.: A robust point inclusion algorithm regions bounded by parametric curve segments. Computer-aided design 29, 771–778 (1997)

    Article  Google Scholar 

  11. Ye, Y., Huang, L., Yang, W., Zhou, Z.: Efficient secure protocol to determine whether a point is inside a convex hull. In: IEEE International Symposium on Information Engineering and Electronic Commerce, IEEC 2009, pp. 100–105. IEEE Press, Los Alamitos (2009)

    Google Scholar 

  12. Amirbekyan, A., Estivill-Castro, V.: A new efficient private preserving scalar product protocol. In: 6th Australasian Data Mining Conference (AusDM 2007), pp. 209–214 (2007)

    Google Scholar 

  13. Du, W., Zhan, Z.: Building decision tree lassifier on private data. In: IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, pp. 1–8 (2002)

    Google Scholar 

  14. Wang, I.-C., Shen, C., et al.: Towards empirical aspects of secure scalar product. In: International Conference on Information Security and Assurance, pp. 573–578 (2008)

    Google Scholar 

  15. Cachin, C.: Efficient private bidding and auctions with an obvious third party. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 120–127. ACM Press, New York (1999)

    Google Scholar 

  16. Ioannidis, I., Grama, A.: An efficient protocol for Yao’s millionaires’ problem. In: Proceedings of the 36th Hawaii International Conference on System Sciences, HICSS 2003 (2003)

    Google Scholar 

  17. Lin, H.Y., Tzeng, W.G.: An efficient solution to the millionaires’ problem based on hormonoorphic encryption. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 456–466. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sun, Y., Sun, H., Zhang, H., Wen, Q. (2010). A Secure Protocol for Point-Segment Position Problem. In: Wang, F.L., Gong, Z., Luo, X., Lei, J. (eds) Web Information Systems and Mining. WISM 2010. Lecture Notes in Computer Science, vol 6318. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16515-3_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16515-3_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16514-6

  • Online ISBN: 978-3-642-16515-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics