Privacy-preserving path-inclusion protocol through oblivious automata


This paper focuses on path-inclusion secure two-party computation problem, and an efficient protocol for securely computing the path-inclusion problem is proposed. This problem is defined in the two parties setting, where Alice and Bob both have a path. The goal of Bob is to learn whether his path is included by the path Alice holds, without revealing it to… (More)


1 Figure or Table

Cite this paper

@article{Huang2012PrivacypreservingPP, title={Privacy-preserving path-inclusion protocol through oblivious automata}, author={Meishan Huang and Bogang Lin and Yang Yang}, journal={2012 IEEE International Conference on Intelligent Control, Automatic Detection and High-End Equipment}, year={2012}, pages={128-132} }