2020
DOI: 10.1007/978-3-030-48513-9_45
|View full text |Cite
|
Sign up to set email alerts
|

Method and Application of Homomorphic Subtraction of the Paillier Cryptosystem in Secure Multi-party Computational Geometry

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 26 publications
0
6
0
Order By: Relevance
“…• The Z 1 = (a 1 , a 2 , ..., a m a ) and Z 1 = (a 1 , a 2 , ..., a m a ) exchanged in step (9) do not have data leakage, because of the addition of their own random numbers. • In step (11), Alice and Bob compute respectively: Then Alice and Bob send Z 1 = (a 1 , a 2 , ..., a m a ) and Z 1 = (a 1 , a 2 , ..., a m a ) to each other.…”
Section: Correctness Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…• The Z 1 = (a 1 , a 2 , ..., a m a ) and Z 1 = (a 1 , a 2 , ..., a m a ) exchanged in step (9) do not have data leakage, because of the addition of their own random numbers. • In step (11), Alice and Bob compute respectively: Then Alice and Bob send Z 1 = (a 1 , a 2 , ..., a m a ) and Z 1 = (a 1 , a 2 , ..., a m a ) to each other.…”
Section: Correctness Analysismentioning
confidence: 99%
“…Secure multi-party computation (MPC), one of three major technical tools of privacy computing, is a collaborative computing method used to compute various types of data. The research problems of MPC mainly include the following aspects: secure computational geometry [10][11][12] , secure data mining 13,14 , secure statistical analysis 15,16 , secure set relationship judgment 17,18 , etc.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…It mainly studies how to make untrusted parties jointly finish a certain kind of privacy computing without any third party. The research problems of MPC mainly include the following aspects: secure comparison of data [1][2][3][4][5], secure computational geometry [6][7][8], secure data mining [9][10][11], secure statistical analysis [12] [13], secure set relationship judgment [14] [15], etc.…”
Section: Introductionmentioning
confidence: 99%
“…As an important research branch of MPC, secure computing geometry can solve practical problems in the military, national defense, finance, life and other fields, which has important research significance. Liu a e-mail: lx2001.lx@163.com studied the secure computing distance between two points [16]. Zhang studied MPC of geometric area and volume [17].…”
Section: Introductionmentioning
confidence: 99%