메뉴 건너뛰기




Volumn 22, Issue 1, 2007, Pages 88-91

Secure two-party point-circle inclusion problem

Author keywords

Computational geometry; Homomorphic encryption scheme; Private comparison; Secure multi party computation

Indexed keywords

HOMOMORPHIC ENCRYPTION SCHEME; PRIVATE COMPARISON; SECURE MULTI-PARTY COMPUTATION;

EID: 33847075772     PISSN: 10009000     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11390-007-9011-0     Document Type: Article
Times cited : (39)

References (20)
  • 1
    • 0242612156 scopus 로고    scopus 로고
    • A practical approach to solve secure multiparty computation problems
    • Virginia Beach, USA, September 23-26
    • Du W, Zhan Z. A practical approach to solve secure multiparty computation problems. In New Security Paradigms Workshop 2002, Virginia Beach, USA, September 23-26, 2002, pp.127-135.
    • (2002) New Security Paradigms Workshop 2002 , pp. 127-135
    • Du, W.1    Zhan, Z.2
  • 2
    • 0242496951 scopus 로고    scopus 로고
    • Secure multi-party computation problems and their applications: A review and open problems
    • New Mexico, USA, September 11-13
    • Du W, Atallah M J. Secure multi-party computation problems and their applications: A review and open problems. In New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 11-13, 2001, pp.11-20.
    • (2001) New Security Paradigms Workshop 2001, Cloudcroft , pp. 11-20
    • Du, W.1    Atallah, M.J.2
  • 3
    • 22844438241 scopus 로고    scopus 로고
    • An algorithm for privacy-preserving Boolean association rule mining
    • Luo Y L, Huang L S et al. An algorithm for privacy-preserving Boolean association rule mining. Acta Electronica Sinica, 2005, 33(5): 900-903.
    • (2005) Acta Electronica Sinica , vol.33 , Issue.5 , pp. 900-903
    • Luo, Y.L.1    Huang, L.S.2
  • 4
    • 33744743349 scopus 로고    scopus 로고
    • Privacy protection in the relative position determination for two spatial geometric objects
    • Luo Y L, Huang L S et al. Privacy protection in the relative position determination for two spatial geometric objects. Journal of Computer Research and Development, 2006, 43(3): 410-416.
    • (2006) Journal of Computer Research and Development , vol.43 , Issue.3 , pp. 410-416
    • Luo, Y.L.1    Huang, L.S.2
  • 5
    • 33646505576 scopus 로고    scopus 로고
    • Privacy-preserving distance measurement and its applications
    • Luo Y L, Huang L S et al. Privacy-preserving distance measurement and its applications. Chinese Journal of Electronica, 2006, 15(2): 237-241.
    • (2006) Chinese Journal of Electronica , vol.15 , Issue.2 , pp. 237-241
    • Luo, Y.L.1    Huang, L.S.2
  • 6
    • 84958035648 scopus 로고    scopus 로고
    • Secure multi-party computational geometry
    • Proc. 7th International Workshop on Algorithms and Data Structures WADS 2001, Springer Verlag
    • Atallah M J, Du W. Secure multi-party computational geometry. In Proc. 7th International Workshop on Algorithms and Data Structures (WADS 2001), Lecture Notes in Computer Science 8125, Springer Verlag, 2001, pp.165-179.
    • (2001) Lecture Notes in Computer Science , vol.8125 , pp. 165-179
    • Atallah, M.J.1    Du, W.2
  • 8
    • 1342345050 scopus 로고    scopus 로고
    • Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters
    • Tzeng W G. Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters. IEEE Transactions on Computers, 2004, 53(2): 232-240.
    • (2004) IEEE Transactions on Computers , vol.53 , Issue.2 , pp. 232-240
    • Tzeng, W.G.1
  • 9
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Advances in CryptologyEUROCRYPT'99, Springer-Verlag
    • Paillier P. Public-key cryptosystems based on composite degree residuosity classes. In Advances in CryptologyEUROCRYPT'99, Lecture Notes in Computer Science 1592, Springer-Verlag, 1999, pp.223-238.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 11
    • 0032218237 scopus 로고    scopus 로고
    • Naccache D, Stern J. A new public-key cryptosystem based on higher residues. In Proc. the 5th ACM Conf. Computer and Communications Security, San Francisco: ACM, 1998, pp.59-66.
    • Naccache D, Stern J. A new public-key cryptosystem based on higher residues. In Proc. the 5th ACM Conf. Computer and Communications Security, San Francisco: ACM, 1998, pp.59-66.
  • 13
    • 0033280866 scopus 로고    scopus 로고
    • Efficient private bidding and auctions with an oblivious third party
    • Singapore
    • Cachin C. Efficient private bidding and auctions with an oblivious third party. In Proc. the 6th ACM Conf. Computer and Communications Security, Singapore, 1999, pp.120-127.
    • (1999) Proc. the 6th ACM Conf. Computer and Communications Security , pp. 120-127
    • Cachin, C.1
  • 16
    • 35048846561 scopus 로고    scopus 로고
    • Strong condition oblivious transfer and computing on intervals
    • Proc. Advances in Cryptology, ASIACRYPT'04, Jeju Island, Korea
    • Blake I F, Kolesnikov V. Strong condition oblivious transfer and computing on intervals. In Proc. Advances in Cryptology - ASIACRYPT'04, LNCS 3329, Jeju Island, Korea, 2004, pp.515-529.
    • (2004) LNCS , vol.3329 , pp. 515-529
    • Blake, I.F.1    Kolesnikov, V.2
  • 17
    • 26444581774 scopus 로고    scopus 로고
    • An efficient solution to the millionaires' problem based on hormomorphic encryption
    • Springer-Verlag
    • Lin H Y, Tzeng W G. An efficient solution to the millionaires' problem based on hormomorphic encryption. Lecture notes in Computer Science 3531, Springer-Verlag, 2005, pp.456-466.
    • (2005) Lecture notes in Computer Science , vol.3531 , pp. 456-466
    • Lin, H.Y.1    Tzeng, W.G.2
  • 19
    • 24944523186 scopus 로고    scopus 로고
    • On secure scalar product computation for privacy-preserving data mining
    • The 7th Annual Int. Conf. Information Security and Cryptology (ICISC 2004, Choonsik Park, Seongtaek Chee eds, Springer-Verlag, Seoul, Korea, Dec
    • Goethals B, Laur S, Lipmaa H, Mielikäinen T. On secure scalar product computation for privacy-preserving data mining. In The 7th Annual Int. Conf. Information Security and Cryptology (ICISC 2004), Choonsik Park, Seongtaek Chee (eds.), LNCS 3506, Springer-Verlag, Seoul, Korea, Dec. 2004, pp. 104-120.
    • (2004) LNCS , vol.3506 , pp. 104-120
    • Goethals, B.1    Laur, S.2    Lipmaa, H.3    Mielikäinen, T.4
  • 20
    • 33847048346 scopus 로고    scopus 로고
    • A faster algorithm of modular exponentiation in RSA
    • Luo Yonglong, Huang Liusheng et al. A faster algorithm of modular exponentiation in RSA. Chinese Journal of Mini-Micro Systems, 2004, 25(1): 76-78.
    • (2004) Chinese Journal of Mini-Micro Systems , vol.25 , Issue.1 , pp. 76-78
    • Yonglong, L.1    Liusheng, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.