Institute of Information Security Issues, Lomonosov MSU
This paper showcase protocols of secure computation with complexity characteristics suitable to practical hiding the coordinates of point objects in unspecified local traffic control zone. Hiding of the coordinates will ensure the protection of road users from both semi-honest adversary who, having...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2017-04-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/54 |
_version_ | 1797705879134404608 |
---|---|
author | Oleg Kazarin |
author_facet | Oleg Kazarin |
author_sort | Oleg Kazarin |
collection | DOAJ |
description | This paper showcase protocols of secure computation with complexity characteristics suitable to practical hiding the coordinates of point objects in unspecified local traffic control zone. Hiding of the coordinates will ensure the protection of road users from both semi-honest adversary who, having taken control of one or several objects, may disclose movement coordinates of fair users, thus violating privacy policy in part of objects’ locations, or from the malicious adversary, who, having taken control of one or several objects may disclose movement coordinates of fair users and, therefore, affect the speed of movement of the controlled objects to facilitate a dangerous closeness and/or collision of the objects. |
first_indexed | 2024-03-12T05:43:50Z |
format | Article |
id | doaj.art-c5a6cc59aead4a47937af2281c21d815 |
institution | Directory Open Access Journal |
issn | 2074-7128 2074-7136 |
language | English |
last_indexed | 2024-03-12T05:43:50Z |
publishDate | 2017-04-01 |
publisher | Joint Stock Company "Experimental Scientific and Production Association SPELS |
record_format | Article |
series | Безопасность информационных технологий |
spelling | doaj.art-c5a6cc59aead4a47937af2281c21d8152023-09-03T05:50:00ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362017-04-01241394810.26583/bit.2017.1.0554Institute of Information Security Issues, Lomonosov MSUOleg Kazarin0Institute of Information Security Issues, Lomonosov MSU Institute for Information Sciences and Security Technologies, RSUHThis paper showcase protocols of secure computation with complexity characteristics suitable to practical hiding the coordinates of point objects in unspecified local traffic control zone. Hiding of the coordinates will ensure the protection of road users from both semi-honest adversary who, having taken control of one or several objects, may disclose movement coordinates of fair users, thus violating privacy policy in part of objects’ locations, or from the malicious adversary, who, having taken control of one or several objects may disclose movement coordinates of fair users and, therefore, affect the speed of movement of the controlled objects to facilitate a dangerous closeness and/or collision of the objects.https://bit.mephi.ru/index.php/bit/article/view/54secure computationsecure function evaluationtwo-party and multi-party protocols of secure computation |
spellingShingle | Oleg Kazarin Institute of Information Security Issues, Lomonosov MSU Безопасность информационных технологий secure computation secure function evaluation two-party and multi-party protocols of secure computation |
title | Institute of Information Security Issues, Lomonosov MSU |
title_full | Institute of Information Security Issues, Lomonosov MSU |
title_fullStr | Institute of Information Security Issues, Lomonosov MSU |
title_full_unstemmed | Institute of Information Security Issues, Lomonosov MSU |
title_short | Institute of Information Security Issues, Lomonosov MSU |
title_sort | institute of information security issues lomonosov msu |
topic | secure computation secure function evaluation two-party and multi-party protocols of secure computation |
url | https://bit.mephi.ru/index.php/bit/article/view/54 |
work_keys_str_mv | AT olegkazarin instituteofinformationsecurityissueslomonosovmsu |