Institute of Information Security Issues, Lomonosov MSU

This paper showcase protocols of secure computation with complexity characteristics suitable to practical hiding the coordinates of point objects in unspecified local traffic control zone. Hiding of the coordinates will ensure the protection of road users from both semi-honest adversary who, having...

Full description

Bibliographic Details
Main Author: Oleg Kazarin
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2017-04-01
Series:Безопасность информационных технологий
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/54
_version_ 1797705879134404608
author Oleg Kazarin
author_facet Oleg Kazarin
author_sort Oleg Kazarin
collection DOAJ
description This paper showcase protocols of secure computation with complexity characteristics suitable to practical hiding the coordinates of point objects in unspecified local traffic control zone. Hiding of the coordinates will ensure the protection of road users from both semi-honest adversary who, having taken control of one or several objects, may disclose movement coordinates of fair users, thus violating privacy policy in part of objects’ locations, or from the malicious adversary, who, having taken control of one or several objects may disclose movement coordinates of fair users and, therefore, affect the speed of movement of the controlled objects to facilitate a dangerous closeness and/or collision of the objects.
first_indexed 2024-03-12T05:43:50Z
format Article
id doaj.art-c5a6cc59aead4a47937af2281c21d815
institution Directory Open Access Journal
issn 2074-7128
2074-7136
language English
last_indexed 2024-03-12T05:43:50Z
publishDate 2017-04-01
publisher Joint Stock Company "Experimental Scientific and Production Association SPELS
record_format Article
series Безопасность информационных технологий
spelling doaj.art-c5a6cc59aead4a47937af2281c21d8152023-09-03T05:50:00ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362017-04-01241394810.26583/bit.2017.1.0554Institute of Information Security Issues, Lomonosov MSUOleg Kazarin0Institute of Information Security Issues, Lomonosov MSU Institute for Information Sciences and Security Technologies, RSUHThis paper showcase protocols of secure computation with complexity characteristics suitable to practical hiding the coordinates of point objects in unspecified local traffic control zone. Hiding of the coordinates will ensure the protection of road users from both semi-honest adversary who, having taken control of one or several objects, may disclose movement coordinates of fair users, thus violating privacy policy in part of objects’ locations, or from the malicious adversary, who, having taken control of one or several objects may disclose movement coordinates of fair users and, therefore, affect the speed of movement of the controlled objects to facilitate a dangerous closeness and/or collision of the objects.https://bit.mephi.ru/index.php/bit/article/view/54secure computationsecure function evaluationtwo-party and multi-party protocols of secure computation
spellingShingle Oleg Kazarin
Institute of Information Security Issues, Lomonosov MSU
Безопасность информационных технологий
secure computation
secure function evaluation
two-party and multi-party protocols of secure computation
title Institute of Information Security Issues, Lomonosov MSU
title_full Institute of Information Security Issues, Lomonosov MSU
title_fullStr Institute of Information Security Issues, Lomonosov MSU
title_full_unstemmed Institute of Information Security Issues, Lomonosov MSU
title_short Institute of Information Security Issues, Lomonosov MSU
title_sort institute of information security issues lomonosov msu
topic secure computation
secure function evaluation
two-party and multi-party protocols of secure computation
url https://bit.mephi.ru/index.php/bit/article/view/54
work_keys_str_mv AT olegkazarin instituteofinformationsecurityissueslomonosovmsu