Privacy-preserving distance computation and proximity testing on earth, done right

@inproceedings{Sedenka2014PrivacypreservingDC,
  title={Privacy-preserving distance computation and proximity testing on earth, done right},
  author={Jaroslav Sedenka and Paolo Gasti},
  booktitle={AsiaCCS},
  year={2014}
}
In recent years, the availability of GPS-enabled smartphones have made location-based services extremely popular. A multitude of applications rely on location information to provide a wide range of services. Location information is, however, extremely sensitive and can be easily abused. In this paper, we introduce the first protocols for secure computation of distance and for proximity testing over a sphere. Our secure distance protocols allow two parties, Alice and Bob, to determine their… CONTINUE READING
Highly Influential
This paper has highly influenced 11 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 30 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 20 extracted citations

Privacy-Preserving Location-Proximity for Mobile Apps

2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP) • 2017
View 6 Excerpts
Highly Influenced

PrivatePool: Privacy-Preserving Ridesharing

2017 IEEE 30th Computer Security Foundations Symposium (CSF) • 2017
View 5 Excerpts
Highly Influenced

Robust location privacy

View 6 Excerpts
Highly Influenced

SPRIDE: Scalable and private continual geo-distance evaluation for precision agriculture

2017 IEEE Conference on Communications and Network Security (CNS) • 2017
View 6 Excerpts
Highly Influenced

EPPD: Efficient and privacy-preserving proximity testing with differential privacy techniques

2016 IEEE International Conference on Communications (ICC) • 2016
View 4 Excerpts
Highly Influenced

MaxPace: Speed-constrained location queries

2016 IEEE Conference on Communications and Network Security (CNS) • 2016
View 4 Excerpts
Highly Influenced

Circular range search on encrypted spatial data

2015 IEEE Conference on Communications and Network Security (CNS) • 2015
View 4 Excerpts
Highly Influenced

References

Publications referenced by this paper.
Showing 1-6 of 6 references

Louis, Lester and Pierre: Three Protocols for Location Privacy

Privacy Enhancing Technologies • 2007
View 9 Excerpts
Highly Influenced

Privacy-Preserving Face Recognition

Privacy Enhancing Technologies • 2009
View 3 Excerpts
Highly Influenced

Virtues of the haversine

R. Sinnott
Sky and Telescope, 68(2), • 1984
View 3 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…