Secure Two-party Protocols for Point Inclusion Problem

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Scientific paper

It is well known that, in theory, the general secure multi-party computation problem is solvable using circuit evaluation protocols. However, the communication complexity of the resulting protocols depend on the size of the circuit that expresses the functionality to be computed and hence can be impractical. Hence special solutions are needed for specific problems for efficiency reasons. The point inclusion problem in computational geometry is a special multiparty computation and has got many applications. Previous protocols for the secure point inclusion problem are not adequate. In this paper we modify some known solutions to the point inclusion problem in computational geometry to the frame work of secure two-party computation.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Secure Two-party Protocols for Point Inclusion Problem does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Secure Two-party Protocols for Point Inclusion Problem, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure Two-party Protocols for Point Inclusion Problem will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-499101

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.