메뉴 건너뛰기




Volumn 3506, Issue , 2005, Pages 104-120

On private scalar product computation for privacy-preserving data mining

Author keywords

Privacy preserving data mining; Private scalar product protocol; Vertically partitioned frequent pattern mining

Indexed keywords

COMPUTATION THEORY; DATA MINING; DATA PRIVACY; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 24944523186     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11496618_9     Document Type: Conference Paper
Times cited : (271)

References (22)
  • 1
    • 84945134014 scopus 로고    scopus 로고
    • Priced oblivious transfer: How to sell digital goods
    • [AIR01]. Birgit Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001 Innsbruck, Austria, 6-10 May. Springer-Verlag
    • [AIR01] William Aiello, Yuval Ishai, and Omer Reingold. Priced Oblivious Transfer: How to Sell Digital Goods. In Birgit Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pages 119-135, Innsbruck, Austria, 6-10 May 2001. Springer-Verlag.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 119-135
    • Aiello, W.1    Ishai, Y.2    Reingold, O.3
  • 2
    • 0001371923 scopus 로고    scopus 로고
    • Fast discovery of association rules
    • +96]. Usama M. Fayyad, Gregory Piatetsky-Shapiro, Padhraic Smyth, and Ramasamy Uthurusamy, editors. AAAI/MIT Press
    • +96] Rakesh Agrawal, Heikki Mannila, Ramakrishnan Srikant, Hannu Toivonen, and A. Inkeri Verkamo. Fast Discovery of Association Rules. In Usama M. Fayyad, Gregory Piatetsky-Shapiro, Padhraic Smyth, and Ramasamy Uthurusamy, editors, Advances in Knowledge Discovery and Data Mining, pages 307-328. AAAI/MIT Press, 1996.
    • (1996) Advances in Knowledge Discovery and Data Mining , pp. 307-328
    • Agrawal, R.1    Mannila, H.2    Srikant, R.3    Toivonen, H.4    Verkamo, A.I.5
  • 3
    • 84942749652 scopus 로고    scopus 로고
    • Frequent closures as a concise representation for binary data mining
    • [BB00]. PAKDD 2000. Springer
    • [BB00] Jean-Fran?is Boulicaut and Artur Bykowski. Frequent Closures as a Concise Representation for Binary Data Mining. In PAKDD 2000, volume 1805 of Lecture Notes in Computer Science, pages 62-73. Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1805 , pp. 62-73
    • Boulicaut, J.-F.1    Bykowski, A.2
  • 4
    • 0037243046 scopus 로고    scopus 로고
    • Free-sets: A condensed representation of boolean data for the approximation of frequency queries
    • [BBR03]
    • [BBR03] Jean-Fran?is Boulicaut, Artur Bykowski, and Christophe Rigotti. Free-Sets: A Condensed Representation of Boolean Data for the Approximation of Frequency Queries. Data Mining and Knowledge Discovery, 7(1):5-22, 2003.
    • (2003) Data Mining and Knowledge Discovery , vol.7 , Issue.1 , pp. 5-22
    • Boulicaut, J.-F.1    Bykowski, A.2    Rigotti, C.3
  • 5
    • 84957375076 scopus 로고    scopus 로고
    • A secure and optimally efficient multi-authority election scheme
    • [CGS97]. Walter Fumy, editor, Advances in Cryptology - EUROCRYPT'97, Konstanz, Germany, 11-15 May. Springer-Verlag
    • [CGS97] Ronald Cramer, Rosario Gennaro, and Berry Schoenmakers. A Secure and Optimally Efficient Multi-Authority Election Scheme. In Walter Fumy, editor, Advances in Cryptology - EUROCRYPT'97, volume 1233 of Lecture Notes in Computer Science, pages 103-118, Konstanz, Germany, 11-15 May 1997. Springer-Verlag.
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 103-118
    • Cramer, R.1    Gennaro, R.2    Schoenmakers, B.3
  • 7
    • 70449677016 scopus 로고    scopus 로고
    • Protocols for secure remote database access with approximate matching
    • [DA01b]. Kluwer Academic Publishers, Boston
    • [DA01b] Wenliang Du and Mikhail J. Atallah. Protocols for Secure Remote Database Access with Approximate Matching, volume 2 of Advances in Information Security, page 192. Kluwer Academic Publishers, Boston, 2001. http://www.wkap.nl/prod/b/0-7923-7399-5.
    • (2001) Advances in Information Security , vol.2 , pp. 192
    • Du, W.1    Atallah, M.J.2
  • 8
    • 84867553981 scopus 로고    scopus 로고
    • A generalisation, a simplification and some applications of Paillier's probabilistic public-key system
    • [DJ01]. Kwangjo Kim, editor, Public Key Cryptography 2001, Cheju Island, Korea, 13-15 February. Springer-Verlag
    • [DJ01] Ivan Damgård and Mads Jurik. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. In Kwangjo Kim, editor, Public Key Cryptography 2001, volume 1992 of Lecture Notes in Computer Science, pages 119-136, Cheju Island, Korea, 13-15 February 2001. Springer-Verlag.
    • (2001) Lecture Notes in Computer Science , vol.1992 , pp. 119-136
    • Damgård, I.1    Jurik, M.2
  • 9
    • 0242612156 scopus 로고    scopus 로고
    • A practical approach to solve secure multi-party computation problems
    • [DZ02]. Carla Marceau and Simon Foley, editors, Virginia Beach, virginia, USA, September 23-26. ACM Press
    • [DZ02] Wenliang Du and Zhijun Zhan. A Practical Approach to Solve Secure Multi-party Computation Problems. In Carla Marceau and Simon Foley, editors, Proceedings of New Security Paradigms Workshop, pages 127-135, Virginia Beach, virginia, USA, September 23-26 2002. ACM Press.
    • (2002) Proceedings of New Security Paradigms Workshop , pp. 127-135
    • Du, W.1    Zhan, Z.2
  • 10
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • [FNP04]. Christian Cachin and Jan Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, Interlaken, Switzerland, 2-6 May. Springer-Verlag
    • [FNP04] Michael J. Freedman, Kobbi Nissim, and Benny Pinkas. Efficient Private Matching and Set Intersection. In Christian Cachin and Jan Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 1-19, Interlaken, Switzerland, 2-6 May 2004. Springer-Verlag.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 12
    • 84957026937 scopus 로고    scopus 로고
    • Secure vickrey auctions without threshold trust
    • [LAN02]. Matt Blaze, editor, Financial Cryptography -Sixth International Conference, Southhampton Beach, Bermuda, 11-14 March. Springer-Verlag
    • [LAN02] Helger Lipmaa, N. Asokan, and Valtteri Niemi. Secure Vickrey Auctions without Threshold Trust. In Matt Blaze, editor, Financial Cryptography -Sixth International Conference, volume 2357 of Lecture Notes in Computer Science, pages 87-101, Southhampton Beach, Bermuda, 11-14 March 2002. Springer-Verlag.
    • (2002) Lecture Notes in Computer Science , vol.2357 , pp. 87-101
    • Lipmaa, H.1    Asokan, N.2    Niemi, V.3
  • 13
    • 0345058958 scopus 로고    scopus 로고
    • On diophantine complexity and statistical zero-knowledge arguments
    • [Lip03]. Chi Sung Laih, editor, Advances on Cryptology - ASIACRYPT 2003, Taipei, Taiwan, 30 November-4 December. Springer-Verlag
    • [Lip03] Helger Lipmaa. On Diophantine Complexity and Statistical Zero-Knowledge Arguments. In Chi Sung Laih, editor, Advances on Cryptology - ASIACRYPT 2003, volume 2894 of Lecture Notes in Computer Science, pages 398-415, Taipei, Taiwan, 30 November-4 December 2003. Springer-Verlag.
    • (2003) Lecture Notes in Computer Science , vol.2894 , pp. 398-415
    • Lipmaa, H.1
  • 14
    • 24944497925 scopus 로고    scopus 로고
    • An oblivious transfer protocol with log-squared total communication
    • [Lip04]. International Association for Cryptologic Research, February 25
    • [Lip04] Helger Lipmaa. An Oblivious Transfer Protocol with Log-Squared Total Communication. Technical Report 2004/063, International Association for Cryptologic Research, February 25 2004.
    • (2004) Technical Report , vol.2004 , Issue.63
    • Lipmaa, H.1
  • 15
    • 24944434888 scopus 로고    scopus 로고
    • On private similarity search protocols
    • [LL04]. Sanna Liimatainen and Teemupekka Virtanen, editors, Espoo, Finland, November 4-5
    • [LL04] Sven Laur and Helger Lipmaa. On Private Similarity Search Protocols. In Sanna Liimatainen and Teemupekka Virtanen, editors, Proceedings of the Ninth Nordic Workshop on Secure IT Systems (NordSec 2004), pages 73-77, Espoo, Finland, November 4-5, 2004.
    • (2004) Proceedings of the Ninth Nordic Workshop on Secure IT Systems (NordSec 2004) , pp. 73-77
    • Laur, S.1    Lipmaa, H.2
  • 17
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • [Pai99]. Jacques Stern, editor, Advances in Cryptology -EUROCRYPT'99, Prague, Czech Republic, 2-6 May. Springer-Verlag
    • [Pai99] Pascal Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Jacques Stern, editor, Advances in Cryptology -EUROCRYPT'99, volume 1592 of Lecture Notes in Computer Science, pages 223-238, Prague, Czech Republic, 2-6 May 1999. Springer-Verlag.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 19
    • 4544312695 scopus 로고    scopus 로고
    • Cryptographic techniques for privacy-preserving data mining
    • [Pin02]
    • [Pin02] Benny Pinkas. Cryptographic Techniques for Privacy-Preserving Data Mining. KDD Explorations, 4(2):12-19, 2002.
    • (2002) KDD Explorations , vol.4 , Issue.2 , pp. 12-19
    • Pinkas, B.1
  • 22
    • 12244255356 scopus 로고    scopus 로고
    • Privacy-preserving Bayesian network structure computation on distributed heterogeneous data
    • [WY04], Seattle, Washington, USA, August 22-25. ACM
    • [WY04] Rebecca N. Wright and Zhiqiang Yang. Privacy-Preserving Bayesian Network Structure Computation on Distributed Heterogeneous Data. In Proceedings of The Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 713-718, Seattle, Washington, USA, August 22-25 2004. ACM.
    • (2004) Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining , pp. 713-718
    • Wright, R.N.1    Yang, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.