Deterministic coin tossing with applications to optimal parallel list ranking
Information and Control
Algorithms in combinatorial geometry
Algorithms in combinatorial geometry
Sorting in c log n parallel steps
Combinatorica
A simple parallel tree contraction algorithm
Journal of Algorithms
An O(n log n) algorithm for the all-nearest-neighbors problem
Discrete & Computational Geometry
The design and analysis of spatial data structures
The design and analysis of spatial data structures
SIGMOD '95 Proceedings of the 1995 ACM SIGMOD international conference on Management of data
Software protection and simulation on oblivious RAMs
Journal of the ACM (JACM)
Computational geometry: algorithms and applications
Computational geometry: algorithms and applications
Computational geometry in C (2nd ed.)
Computational geometry in C (2nd ed.)
Data structures for mobile data
SODA '97 Proceedings of the eighth annual ACM-SIAM symposium on Discrete algorithms
Secure multi-party computation problems and their applications: a review and open problems
Proceedings of the 2001 workshop on New security paradigms
Universally composable two-party and multi-party secure computation
STOC '02 Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
Deterministic Parallel List Ranking
AWOC '88 Proceedings of the 3rd Aegean Workshop on Computing: VLSI Algorithms and Architectures
Secure Multi-party Computational Geometry
WADS '01 Proceedings of the 7th International Workshop on Algorithms and Data Structures
A practical approach to solve Secure Multi-party Computation problems
Proceedings of the 2002 workshop on New security paradigms
Voronoi diagram and convex hull based geocasting and routing in wireless networks: Research Articles
Wireless Communications & Mobile Computing - Special Issue on Ad Hoc Wireless Networks
Nearest and reverse nearest neighbor queries for moving objects
The VLDB Journal — The International Journal on Very Large Data Bases
Secure two-party computational geometry
Journal of Computer Science and Technology
Fairplay—a secure two-party computation system
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Privacy-preserving Protocols for Finding the Convex Hulls
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Parallel tree contraction and its application
SFCS '85 Proceedings of the 26th Annual Symposium on Foundations of Computer Science
Well-separated pair decomposition in linear time?
Information Processing Letters
FairplayMP: a system for secure multi-party computation
Proceedings of the 15th ACM conference on Computer and communications security
Dual-heap kNN: k-nearest neighbor search for spatial data retrieval in embedded DBMS
Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems
Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems
Mobile continuous nearest neighbor queries on air
Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems
A Practical Three-Dimensional Privacy-Preserving Approximate Convex Hulls Protocol
FCST '08 Proceedings of the 2008 Japan-China Joint Workshop on Frontier of Computer Science and Technology
Security and privacy for geospatial data: concepts and research directions
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
A Convex Hull Algorithm for Planar Point Set Based on Privacy Protecting
ETCS '09 Proceedings of the 2009 First International Workshop on Education Technology and Computer Science - Volume 03
Privacy-preserving techniques for location-based services
SIGSPATIAL Special
Privacy in location-aware systems
SIGSPATIAL Special
Privacy for real-time location-based services
SIGSPATIAL Special
Privacy and location anonymization in location-based services
SIGSPATIAL Special
Privacy in location-based services: a system architecture perspective
SIGSPATIAL Special
Finding long and similar parts of trajectories
Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Analysis of wireless localization using non-line-of-sight radio signals
Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Secure multi-party computation made simple
Discrete Applied Mathematics - Special issue: Coding and cryptography
Bureaucratic protocols for secure two-party sorting, selection, and permuting
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Randomized Shellsort: a simple oblivious sorting algorithm
SODA '10 Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete Algorithms
Protocol to compute polygon intersection in STC model
ICICA'11 Proceedings of the Second international conference on Information Computing and Applications
Graph drawing in the cloud: privately visualizing relational data using small working storage
GD'12 Proceedings of the 20th international conference on Graph Drawing
Data-oblivious graph algorithms for secure computation and outsourcing
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Privacy-preserving matrix factorization
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Hi-index | 0.00 |
We give efficient data-oblivious algorithms for several fundamental geometric problems that are relevant to geographic information systems, including planar convex hulls and all-nearest neighbors. Our methods are "data-oblivious" in that they don't perform any data-dependent operations, with the exception of operations performed inside low-level blackbox circuits having a constant number of inputs and outputs. Thus, an adversary who observes the control flow of one of our algorithms, but who cannot see the inputs and outputs to the blackbox circuits, cannot learn anything about the input or output. This behavior makes our methods applicable to secure multiparty computation (SMC) protocols for geographic data used in location-based services. In SMC protocols, multiple parties wish to perform a computation on their combined data without revealing individual data to the other parties. For instance, our methods can be used to solve a problem posed by Du and Atallah, where Alice has a set, A, of m private points in the plane, Bob has another set, B, of n private points in the plane, and Alice and Bob want to jointly compute the convex hull of A ∪ B without disclosing any more information than what can be derived from the answer. In particular, neither Alice nor Bob want to reveal any of their respective points that are in the interior of the convex hull of A ∪ B.