期刊论文详细信息
Bezopasnostʹ Informacionnyh Tehnologij
Institute of Information Security Issues, Lomonosov MSU
Oleg Kazarin1 
[1] Institute of Information Security Issues, Lomonosov MSUInstitute for Information Sciences and Security Technologies, RSUH;
关键词: secure computation;    secure function evaluation;    two-party and multi-party protocols of secure computation;   
DOI  :  10.26583/bit.2017.1.05
来源: DOAJ
【 摘 要 】

This paper showcase protocols of secure computation with complexity characteristics suitable to practical hiding the coordinates of point objects in unspecified local traffic control zone. Hiding of the coordinates will ensure the protection of road users from both semi-honest adversary who, having taken control of one or several objects, may disclose movement coordinates of fair users, thus violating privacy policy in part of objects’ locations, or from the malicious adversary, who, having taken control of one or several objects may disclose movement coordinates of fair users and, therefore, affect the speed of movement of the controlled objects to facilitate a dangerous closeness and/or collision of the objects.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:0次