Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security 2014
DOI: 10.1145/2590296.2590307
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving distance computation and proximity testing on earth, done right

Abstract: In recent years, the availability of GPS-enabled smartphones have made location-based services extremely popular. A multitude of applications rely on location information to provide a wide range of services. Location information is, however, extremely sensitive and can be easily abused. In this paper, we introduce the first protocols for secure computation of distance and for proximity testing over a sphere. Our secure distance protocols allow two parties, Alice and Bob, to determine their mutual distance with… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
19
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 35 publications
(19 citation statements)
references
References 32 publications
(45 reference statements)
0
19
0
Order By: Relevance
“…We discuss the most prominent approaches in relation to InnerCircle. Seděnka and Gasti [29] homomorphically compute distances using the UTM projection, ECEF (Earth-Centered Earth-Fixed) coordinates, and using the Haversine formula. Haversine and ECEF are both useful when considering the curvature of the earth.…”
Section: Methodsmentioning
confidence: 99%
“…We discuss the most prominent approaches in relation to InnerCircle. Seděnka and Gasti [29] homomorphically compute distances using the UTM projection, ECEF (Earth-Centered Earth-Fixed) coordinates, and using the Haversine formula. Haversine and ECEF are both useful when considering the curvature of the earth.…”
Section: Methodsmentioning
confidence: 99%
“…So far several solutions for privacy-preserving location proximity (PPLP) schemes have been proposed, e.g., [6,16,25,[29][30][31][35][36][37]. In early literature [6], privacy-preserving location proximity computation is realized by an imprecise location-based range query that allows a user to approximately learn if any of its communication partners is within a fixed distance from her current location.…”
Section: Related Workmentioning
confidence: 99%
“…The proximity detection is achieved by testing whether two users share at least one triangle. However, as discussed in [29], the protocols of [25] may introduce different errors in practice.…”
Section: Related Workmentioning
confidence: 99%
“…Some recent works [2], [25], [26] considering private proximity testing directly between two users are also related to circular range search over encrypted spatial data we study in this paper. Specifically, with private proximity testing, a user Alice is able to test whether another user Bob is within some certain distance without revealing any user's specific location to each other.…”
Section: Related Workmentioning
confidence: 99%
“…In these schemes [2], [25], [26], the private computation and comparison of the distance between Alice and Bob are generally achieved by using Secure Two-Party Computation [27] (e.g., Garbled Circuits [26]), which inevitably introduce multiple rounds of interactions between the two parties. While our work is targeting a design with a minimal one-round clientserver interaction (see some further discussions in the next section).…”
Section: Related Workmentioning
confidence: 99%