NDLI logo
  • Content
  • Similar Resources
  • Metadata
  • Cite This
  • Log-in
  • Fullscreen
Log-in
Do not have an account? Register Now
Forgot your password? Account recovery
  1. Journal of Computer Science and Technology
  2. Journal of Computer Science and Technology : Volume 22
  3. Journal of Computer Science and Technology : Volume 22, Issue 1, January 2007
  4. Secure Two-Party Point-Circle Inclusion Problem
Loading...

Please wait, while we are loading the content...

Journal of Computer Science and Technology : Volume 32
Journal of Computer Science and Technology : Volume 31
Journal of Computer Science and Technology : Volume 30
Journal of Computer Science and Technology : Volume 29
Journal of Computer Science and Technology : Volume 28
Journal of Computer Science and Technology : Volume 27
Journal of Computer Science and Technology : Volume 26
Journal of Computer Science and Technology : Volume 25
Journal of Computer Science and Technology : Volume 24
Journal of Computer Science and Technology : Volume 23
Journal of Computer Science and Technology : Volume 22
Journal of Computer Science and Technology : Volume 22, Issue 6, November 2007
Journal of Computer Science and Technology : Volume 22, Issue 5, September 2007
Journal of Computer Science and Technology : Volume 22, Issue 4, July 2007
Journal of Computer Science and Technology : Volume 22, Issue 3, May 2007
Journal of Computer Science and Technology : Volume 22, Issue 2, March 2007
Journal of Computer Science and Technology : Volume 22, Issue 1, January 2007
Implementing a 1GHz Four-Issue Out-of-Order Execution Microprocessor in a Standard Cell ASIC Methodology
An Energy-Efficient Instruction Scheduler Design with Two-Level Shelving and Adaptive Banking
A 485ps 64-Bit Parallel Adder in 0.18μm CMOS
Unified Parallel Systolic Multiplier Over ${\it GF}(2^{m})$
Bounded Model Checking of CTL
CSchema: A Downgrading Policy Language for XML Access Control
Two-Factor Cancelable Biometrics Authenticator
Higher-Level Hardware Synthesis of the KASUMI Algorithm
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt’2004
Relationship Between a Non-Malleable Commitment Scheme and a Modified Selective Decommitment Scheme
Improved Collision Attack on Hash Function MD5
Secure Two-Party Point-Circle Inclusion Problem
Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem
A New Public-Key Encryption Scheme
Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts
Chameleon Hashes Without Key Exposure Based on Factoring
An Efficient Handoff Decision Algorithm for Vertical Handoff Between WWAN and WLAN
FloodNet: Coupling Adaptive Sampling with Energy Aware Routing in a Flood Warning System
An Efficient Data Dissemination Scheme for Spatial Query Processing
End-to-End Utilization Control for Aperiodic Tasks in Distributed Real-Time Systems
3D Morphing Using Strain Field Interpolation
Visual Simulation of Multiple Unmixable Fluids
A Markov Random Field Model-Based Approach to Natural Image Matting
Journal of Computer Science and Technology : Volume 21
Journal of Computer Science and Technology : Volume 20
Journal of Computer Science and Technology : Volume 19
Journal of Computer Science and Technology : Volume 18
Journal of Computer Science and Technology : Volume 17
Journal of Computer Science and Technology : Volume 16
Journal of Computer Science and Technology : Volume 15
Journal of Computer Science and Technology : Volume 14
Journal of Computer Science and Technology : Volume 13
Journal of Computer Science and Technology : Volume 12

Similar Documents

...
Secure Two-Party Computational Geometry

Article

...
T-Private and t-Secure Auctions

Article

...
A Protocol for a Private Set-Operation

Article

...
A Secure Scalar Product Protocol Against Malicious Adversaries

Article

...
Oblivious polynomial evaluation

Article

...
A New Public-Key Encryption Scheme

Article

...
Provably Secure Role-Based Encryption with Revocation Mechanism

Article

...
Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model

Article

...
A New Feistel-Type White-Box Encryption Scheme

Article

Secure Two-Party Point-Circle Inclusion Problem

Content Provider SpringerLink
Author Luo, Yong Long Huang, Liu Sheng Zhong, Hong
Copyright Year 2007
Abstract Privacy-preserving computational geometry is a special secure multi-party computation and has many applications. Previous protocols for determining whether a point is inside a circle are not secure enough. We present a two-round protocol for computing the distance between two private points and develop a more efficient protocol for the point-circle inclusion problem based on the distance protocol. In comparison with previous solutions, our protocol not only is more secure but also reduces the number of communication rounds and the number of modular multiplications significantly.
Starting Page 88
Ending Page 91
Page Count 4
File Format PDF
ISSN 10009000
Journal Journal of Computer Science and Technology
Volume Number 22
Issue Number 1
e-ISSN 18604749
Language English
Publisher Kluwer Academic Publishers
Publisher Date 2007-02-14
Publisher Place Boston
Access Restriction One Nation One Subscription (ONOS)
Subject Keyword secure multi-party computation computational geometry homomorphic encryption scheme, private comparison Computer Science Software Engineering Data Structures, Cryptology and Information Theory Theory of Computation Information Systems Applications (incl.Internet) Artificial Intelligence (incl. Robotics)
Content Type Text
Resource Type Article
Subject Theoretical Computer Science Computational Theory and Mathematics Computer Science Applications Software Hardware and Architecture
  • About
  • Disclaimer
  • Feedback
  • Sponsor
  • Contact
  • Chat with Us
About National Digital Library of India (NDLI)
NDLI logo

National Digital Library of India (NDLI) is a virtual repository of learning resources which is not just a repository with search/browse facilities but provides a host of services for the learner community. It is sponsored and mentored by Ministry of Education, Government of India, through its National Mission on Education through Information and Communication Technology (NMEICT). Filtered and federated searching is employed to facilitate focused searching so that learners can find the right resource with least effort and in minimum time. NDLI provides user group-specific services such as Examination Preparatory for School and College students and job aspirants. Services for Researchers and general learners are also provided. NDLI is designed to hold content of any language and provides interface support for 10 most widely used Indian languages. It is built to provide support for all academic levels including researchers and life-long learners, all disciplines, all popular forms of access devices and differently-abled learners. It is designed to enable people to learn and prepare from best practices from all over the world and to facilitate researchers to perform inter-linked exploration from multiple sources. It is developed, operated and maintained from Indian Institute of Technology Kharagpur.

Learn more about this project from here.

Disclaimer

NDLI is a conglomeration of freely available or institutionally contributed or donated or publisher managed contents. Almost all these contents are hosted and accessed from respective sources. The responsibility for authenticity, relevance, completeness, accuracy, reliability and suitability of these contents rests with the respective organization and NDLI has no responsibility or liability for these. Every effort is made to keep the NDLI portal up and running smoothly unless there are some unavoidable technical issues.

Feedback

Sponsor

Ministry of Education, through its National Mission on Education through Information and Communication Technology (NMEICT), has sponsored and funded the National Digital Library of India (NDLI) project.

Contact National Digital Library of India
Central Library (ISO-9001:2015 Certified)
Indian Institute of Technology Kharagpur
Kharagpur, West Bengal, India | PIN - 721302
See location in the Map
03222 282435
Mail: support@ndl.gov.in
Sl. Authority Responsibilities Communication Details
1 Ministry of Education (GoI),
Department of Higher Education
Sanctioning Authority https://www.education.gov.in/ict-initiatives
2 Indian Institute of Technology Kharagpur Host Institute of the Project: The host institute of the project is responsible for providing infrastructure support and hosting the project https://www.iitkgp.ac.in
3 National Digital Library of India Office, Indian Institute of Technology Kharagpur The administrative and infrastructural headquarters of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
4 Project PI / Joint PI Principal Investigator and Joint Principal Investigators of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
Prof. Saswat Chakrabarti  will be added soon
5 Website/Portal (Helpdesk) Queries regarding NDLI and its services support@ndl.gov.in
6 Contents and Copyright Issues Queries related to content curation and copyright issues content@ndl.gov.in
7 National Digital Library of India Club (NDLI Club) Queries related to NDLI Club formation, support, user awareness program, seminar/symposium, collaboration, social media, promotion, and outreach clubsupport@ndl.gov.in
8 Digital Preservation Centre (DPC) Assistance with digitizing and archiving copyright-free printed books dpc@ndl.gov.in
9 IDR Setup or Support Queries related to establishment and support of Institutional Digital Repository (IDR) and IDR workshops idr@ndl.gov.in
I will try my best to help you...
Cite this Content
Loading...