A NEW PRIVACY-PRESERVING EUCLID-DISTANCE PROTOCOL AND ITS APPLICATIONS IN WSNS

来源 :Journal of Electronics(China) | 被引量 : 0次 | 上传用户:wcf333
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-party computation. In this paper, we devote to investigating the solutions to some secure geometric problems in a cooperative environment. The problem is collaboratively computing the Euclid-distance between two private vectors without disclosing the private input to each other. A general privacy-preserving Euclid-distance protocol is firstly presented as a building block and is proved to be secure and efficient in the comparison with the previous methods. And we proposed a new protocol for the application in Wireless Sensor Networks (WSNs), based on the novel Euclid-distance protocol and Density-Based Clustering Protocol (DBCP), so that the nodes from two sides can compute cooperatively to divide them into clusters without disclosing their location information to the opposite side. Secure, multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-party computation. In this paper, we devote to investigating the solutions to some secure geometric problems in a cooperative environment. The problem is collaboratively computing the Euclid-distance between two private vectors without disclosing the private input to each other. A general privacy-preserving Euclid-distance protocol is represented as a building block and And we propose a new protocol for the application in Wireless Sensor Networks (WSNs), based on the novel Euclid-distance protocol and Density-Based Clustering Protocol (DBCP), so that the nodes from two sides can compute cooperatively to divide them into clusters without disclosing their location information to the oppo site side.
其他文献
世界只有一个邮政网,邮政将世界紧密相连。由电子商务、IP电话局、政府上网、网上教育、网上邮局等组成的网络信息中心正带动邮政信息化的新一轮革命。从自助邮局到自助银行,从网
本文介绍了微波防护纺织品屏蔽原理以及屏蔽效果的测试,指出微波防护纺织品的防护效果是有效的,并说明了在使用防护用品时应注意的问题.
空闲的午后,带着开始僵硬的脖颈,离开令人麻木的办公室,我常坐进茶室,来到音乐和陌生人中间,寻求那种置身人外又保持距离的温暖和自由。点上一壶菊花清茶,看着盈盈花茶,用嘴
本文提出了一种基于信誉机制的P2P网络,以量化的信誉度值来判断节点的合法性;给出了该网络的运行机制及恶意节点的检测和处理方式。
Precoding methods at the Base Station (BS) can be used to deal with the inter-cell interference and improve the signal quality of the user especially at the cel
伍德夫妇去年就委托一家房地产代理商帮他们卖掉住了25年的老房子以便告老还乡.但事情进展得很不顺利.代理商告诉他们:房子本身的条件是相当不错的,但买主们一听说地处繁华街
This paper presents a novel way to improve Transmission Control Protocol (TCP) performance of the users at the edge areas of the macro cells in Long Term Evolut
凡事皆有宜忌,当行则行,当止则止。饮酒亦不例外。饮酒讲究科学,方能有利于养生益寿,否则,滥饮无度,不知进退,有害无益。 饮酒有哪些禁忌呢? (1)忌饮酒过量古书中记载“饮酒
A Two-hop Wireless Network (TWN) is the basic topology structure that provides network coding opportunity for improving throughput. Network coding on a homogene
This article aims at designing a new Multivariate Quadratic (MQ) public-key scheme to avoid the linearization attack and differential attack against the Matsumo