Sciweavers

Share
JCIT
2010

Improvement of a Secure Convex Hull Two-Party Computation Protocol

8 years 3 months ago
Improvement of a Secure Convex Hull Two-Party Computation Protocol
In 2008, Wang et. al. first investigate a sort of specific secure multi-party computation--secure convex hull two-party computation, and construct two protocols based on Gift wrapping method and Quick method separately. However, there are some errors in his protocol based on Quick method. This paper proposes two effective improved protocols. In addition, we analyze and compare security, computational complexity and communicational complexity about these two improved protocols.
Wenjie Zhao, Mingxing He
Added 19 May 2011
Updated 19 May 2011
Type Journal
Year 2010
Where JCIT
Authors Wenjie Zhao, Mingxing He
Comments (0)
books