Private Trajectory Intersection Testing: Is Garbled Circuit Better than Custom Protocols?

Publish Year: 1400
نوع سند: مقاله ژورنالی
زبان: English
View: 459

This Paper With 10 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_IJE-34-4_012

تاریخ نمایه سازی: 6 اردیبهشت 1400

Abstract:

In this paper, two protocols are presented for private intersection detection of two moving objects’ trajectories. Assuming that the movement trajectory of an object can be described by a time-dependent polynomial function, the problem of finding the intersection points is simplified to the problem of finding the common roots of the corresponding polynomials. Thereafter, GrÖbner Basis is used to design a novel secure protocol of finding the common roots of the polynomials. Another protocol is also designed based on the distance computation of two trajectories’ curves. Moreover, we present the complexity analysis of the protocol for private trajectory intersection testing of two moving objects, which is based on GrÖbner Basis. Then, we compare its complexity by the garbled circuit-based protocol for Euclidean Distance Computation of l points. We also prove the security of our proposed protocol, which is based on the distance computation of two curves. Keywords: Private Trajectory Intersection Testing, GrÖbner Basis, Distance Computation, Complexity , Garbled Circuit, Euclidean Distance

Keywords:

Authors

M. Dehghan

Department of Computer Engineering, Amirkabir University of Technology, Tehran, Iran

B. Sadeghiyan

Department of Computer Engineering, Amirkabir University of Technology, Tehran, Iran

E. Khosravian

Department of Mechanical Engineering, Payame Noor University, Tehran, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • 1.     Asadi Saeed Abad, F., and Hamidi, H., "An Architecture ...
  • 2.     Yao, A. C., "Protocols for secure computations", 23rd Annual ...
  • 3.     Goldreich, O., Micali, S., and Wigderson, A., "How to ...
  • 4.     Hemenway, B., Lu, S., Ostrovsky, R., and Welser IV, ...
  • 5.     Atallah, M. J., and Du, W., "Secure Multi-party Computational ...
  • 6.     Frikken, K. B., and Atallah, M. J., "Privacy preserving ...
  • 7.     Cheng, R., Zhang, Y., Bertino, E., and Prabhakar, S., ...
  • 8.     Mascetti, S., Freni, D., Bettini, C., Wang, X. S., ...
  • 9.     Zhu, H., Wang, F., Lu, R., Liu, F., Fu, ...
  • 10.   Zheng, Y., Li, M., Lou, W., and Hou, Y. ...
  • 11.   Järvinen, K., Kiss, Á., Schneider, T., Tkachenko, O., and ...
  • 12.   Pagnin, E., Gunnarsson, G., Talebi, P., Orlandi, C., and ...
  • 13.   Farokhi, F., Shames, I., and Johansson, K. H., "Private ...
  • 14.   Oleynikov, I., Pagnin, E., and Sabelfeld, A., "Where Are ...
  • 15.   Chor, B., Kushilevitz, E., Goldreich, O., and Sudan, M., ...
  • 16.   Siksnys, L., Thomsen, J. R., Šaltenis, S., and Yiu, ...
  • 17.   Šikšnys, L., Thomsen, J. R., Šaltenis, S., Yiu, M. ...
  • 18.   Zhong, G., Goldberg, I., and Hengartner, U., "Louis, Lester ...
  • 19.   Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., and ...
  • 20.   Chatterjee, S., Karabina, K., and Menezes, A., "A New ...
  • 21.   Magkos, E., Kotzanikolaou, P., Magioladitis, M., Sioutas, S., and ...
  • 22.   Kotzanikolaou, P., Patsakis, C., Magkos, E., and Korakakis, M., ...
  • 23.   Šeděnka, J., and Gasti, P., "Privacy-preserving distance computation and ...
  • 24.   Dehghan, M., and Sadeghiyan, B., "Privacy‐preserving collision detection of ...
  • 25.   Huang, Y., Evans, D., and Katz, J., "Private set ...
  • 26.   Bellare, M., Hoang, V. T., and Rogaway, P., "Foundations ...
  • 27.   Rabin, M. O., "How To Exchange Secrets with Oblivious ...
  • 28.   Yao, A. C.-C., "How to generate and exchange secrets", ...
  • 29.   Naor, M., and Pinkas, B., "Efficient oblivious transfer protocols", ...
  • 30.   Ishai, Y., Kilian, J., Nissim, K., and Petrank, E., ...
  • 31.   Lindell, Y., and Pinkas, B., "A Proof of Security ...
  • 32.   Cox, D. A., Little, J., and O’Shea, D., Ideals, ...
  • 33.   Li, R., and Wu, C., "An Unconditionally Secure Protocol ...
  • 34.   Zahur, S., Rosulek, M., and Evans, D., "Two Halves ...
  • 35.   Pinkas, B., Schneider, T., Smart, N. P., and Williams, ...
  • 36.   Kolesnikov, V., and Schneider, T., "Improved Garbled Circuit: Free ...
  • 37.   Kolesnikov, V., Mohassel, P., and Rosulek, M., "FleXOR: Flexible ...
  • نمایش کامل مراجع