z-logo
open-access-imgOpen Access
Secure two-party computation of solid triangle area and tetrahedral volume based on cloud platform
Author(s) -
Jing Zhang,
Lixiang Li,
Yongli Tang,
Luo Si,
Yixian Yang,
Xin Yang
Publication year - 2019
Publication title -
plos one
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.99
H-Index - 332
ISSN - 1932-6203
DOI - 10.1371/journal.pone.0217067
Subject(s) - cloud computing , computer science , block (permutation group theory) , computation , tetrahedron , secure multi party computation , point cloud , euclidean space , protocol (science) , euclidean geometry , distributed computing , theoretical computer science , computer security , algorithm , mathematics , geometry , artificial intelligence , medicine , alternative medicine , pathology , pure mathematics , operating system
With the emergence and widespread application of cloud computing, the use of cloud platforms to solve the problem of secure multi-party computation has emerged as a new research direction. The traditional computation of a solid geometry is performed through mutual interactions between two parties, which is not suitable in an untrusted cloud computing environment. In this paper, we first design a basic protocol for a secure Euclidean distance calculation that is suitable for cloud platforms and can serve as a building block for other protocols on cloud platforms. Using the solution of the Euclidean distance problem as such a building block, we provide a new method that converts the problems of calculating solid triangular areas and solid tetrahedral volumes into the calculation of distances and determinants in three-dimensional space. Then, we discuss solid point-line distance calculations, which extent the idea of the spatial geometry security problem. We present protocols for the above problems and prove that the proposed protocols can resist conspiracy among users and the untrusted cloud platform so that they can effectively ensure the privacy of the users. We also analyze the performances of these solutions. The analysis results show that our scheme is more versatile.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here