Безопасность информационных технологий (Apr 2017)

Institute of Information Security Issues, Lomonosov MSU

  • Oleg Kazarin

DOI
https://doi.org/10.26583/bit.2017.1.05
Journal volume & issue
Vol. 24, no. 1
pp. 39 – 48

Abstract

Read online

This paper showcase protocols of secure computation with complexity characteristics suitable to practical hiding the coordinates of point objects in unspecified local traffic control zone. Hiding of the coordinates will ensure the protection of road users from both semi-honest adversary who, having taken control of one or several objects, may disclose movement coordinates of fair users, thus violating privacy policy in part of objects’ locations, or from the malicious adversary, who, having taken control of one or several objects may disclose movement coordinates of fair users and, therefore, affect the speed of movement of the controlled objects to facilitate a dangerous closeness and/or collision of the objects.

Keywords