透過您的圖書館登入
IP:3.149.234.141
  • 期刊

Secure Two-party Protocols for Point Inclusion Problem

並列摘要


It is well known that, in theory, the general secure multiparty computation problem is solvable using circuit evaluation protocols. However, the communication complexity of the resulting protocols depend on the size of the circuit that expresses the functionality to be computed and hence can be impractical. Hence special solutions are needed for specific problems for efficiency reasons. The point inclusion problem in computational geometry is a special multiparty computation and has got many applications. Previous protocols for the secure point inclusion problem are not adequate. In this paper we modify some known solutions to the point inclusion problem in computational geometry to the frame work of secure two-party computation.

被引用紀錄


沈娟娟(2014)。新現實主義下歐盟共同外交及安全政策之發展與前景〔博士論文,淡江大學〕。華藝線上圖書館。https://doi.org/10.6846/TKU.2014.01207
Schmidt, W. J. (2014). 孫子兵法對現今中國崛起之影響 [master's thesis, Tamkang University]. Airiti Library. https://doi.org/10.6846/TKU.2014.00187
CEDENO, E. K. S. (2013). 巴拿馬運河擴建工程對巴拿馬與臺灣經濟關係的影響 [master's thesis, Tamkang University]. Airiti Library. https://doi.org/10.6846/TKU.2013.01130
Shen, D. J. C. (2011). 自由主義與美國政治傳統 [doctoral dissertation, Tamkang University]. Airiti Library. https://doi.org/10.6846/TKU.2011.01273
連斐璠(2009)。中共政治繼承之研究-從江澤民到胡錦濤〔碩士論文,淡江大學〕。華藝線上圖書館。https://doi.org/10.6846/TKU.2009.00204

延伸閱讀