메뉴 건너뛰기




Volumn 4521 LNCS, Issue , 2007, Pages 237-252

Privacy-preserving set union

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PRIVACY; LEARNING SYSTEMS; MATHEMATICAL MODELS; NETWORK PROTOCOLS; NETWORK SECURITY;

EID: 38049089776     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-72738-5_16     Document Type: Conference Paper
Times cited : (72)

References (24)
  • 1
    • 33646793331 scopus 로고    scopus 로고
    • Privacy-preserving graph algorithms in the semihonest model
    • Proceedings of Advances in Cryptology, ASIACRYPT '05, of
    • J. Brickel and V. Shmatikov. Privacy-preserving graph algorithms in the semihonest model. In Proceedings of Advances in Cryptology - ASIACRYPT '05, volume 3788 of Lecture Notes in Computer Science, pages 236-252, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3788 , pp. 236-252
    • Brickel, J.1    Shmatikov, V.2
  • 2
    • 84945124606 scopus 로고    scopus 로고
    • Multiparty computation from threshold homomorphic encryption
    • Proceedings of Advances in Cryptology, EUROCRYPT '01, of
    • R. Cramer, I. Damgård, and J. Nielsen. Multiparty computation from threshold homomorphic encryption. In Proceedings of Advances in Cryptology - EUROCRYPT '01, volume 2045 of Lecture Notes in Computer Science, pages 280-299, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 280-299
    • Cramer, R.1    Damgård, I.2    Nielsen, J.3
  • 3
    • 33745124039 scopus 로고    scopus 로고
    • Constant-round multiparty computation using a black-box pseudorandom generator
    • Proceedings of Advances in Cryptology, CRYPTO '05, of
    • I. Damgård and Y. Ishai. Constant-round multiparty computation using a black-box pseudorandom generator. In Proceedings of Advances in Cryptology - CRYPTO '05, volume 3621 of Lecture Notes in Computer Science, pages 378-411, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 378-411
    • Damgård, I.1    Ishai, Y.2
  • 7
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Proceedings of Advances in Cryptology, CRYPTO '86, of
    • A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Proceedings of Advances in Cryptology - CRYPTO '86, volume 263 of Lecture Notes in Computer Science, pages 186-194, 1986.
    • (1986) Lecture Notes in Computer Science , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 8
    • 84944328129 scopus 로고    scopus 로고
    • Sharing decryption in the context of voting or lotteries
    • Pierre-Alain Fouque, Guillaume Poupard, and Jacques Stern. Sharing decryption in the context of voting or lotteries. Lecture Notes in Computer Science, 1962: 90-104, 2001.
    • (2001) Lecture Notes in Computer Science , vol.1962 , pp. 90-104
    • Fouque, P.1    Poupard, G.2    Stern, J.3
  • 9
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • Proceedings of Advances in Cryptology, EUROCRYPT '04, of
    • M. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In Proceedings of Advances in Cryptology - EUROCRYPT '04, volume 3027 of Lecture Notes in Computer Science, pages 1-19, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 1-19
    • Freedman, M.1    Nissim, K.2    Pinkas, B.3
  • 10
    • 38049090980 scopus 로고    scopus 로고
    • O. Goldreich. Foundations of Cryptography: II Basic Application. Cambridge University Press, 2004.
    • O. Goldreich. Foundations of Cryptography: Volume II Basic Application. Cambridge University Press, 2004.
  • 15
    • 85084162002 scopus 로고    scopus 로고
    • Making mix nets robust for electronic voting by randomized partial checking
    • M. Jakobsson, A. Juels, and R. Rivest. Making mix nets robust for electronic voting by randomized partial checking. In Proceedings of USENIX'02, pages 339-353, 2002.
    • (2002) Proceedings of USENIX'02 , pp. 339-353
    • Jakobsson, M.1    Juels, A.2    Rivest, R.3
  • 16
    • 4544361334 scopus 로고    scopus 로고
    • Privacy-preserving distributed mining of association rules on horizontally partitioned data
    • September
    • M. Kantarcioglu and C. Clifton. Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Transactions on Knowledge and Data Engineering, 16(9): 1026-1037, September 2004.
    • (2004) IEEE Transactions on Knowledge and Data Engineering , vol.16 , Issue.9 , pp. 1026-1037
    • Kantarcioglu, M.1    Clifton, C.2
  • 17
    • 26444553355 scopus 로고    scopus 로고
    • Testing disjointness of private datasets
    • Proceedings of Financial Cryptography, of
    • A. Kiayias and A. Mitrofanova. Testing disjointness of private datasets. In Proceedings of Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 109-124, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3570 , pp. 109-124
    • Kiayias, A.1    Mitrofanova, A.2
  • 18
    • 38049052127 scopus 로고    scopus 로고
    • L. Kissner and D. Song. Privacy-preserving set operations. In Proceedings of Advances in Cryptology - CRYPTO '05, 3621 of Lecture Notes in Computer Science, 2005. Full version appears at http://www.cs.cmu.edu/leak/.
    • L. Kissner and D. Song. Privacy-preserving set operations. In Proceedings of Advances in Cryptology - CRYPTO '05, volume 3621 of Lecture Notes in Computer Science, 2005. Full version appears at http://www.cs.cmu.edu/leak/.
  • 22
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Proceedings of Advances in Cryptology, EUROCRYPT '99, of
    • P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of Advances in Cryptology - EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science, pages 573-584, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 573-584
    • Paillier, P.1
  • 24
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. Yao. How to generate and exchange secrets. In Proceedings of FOCS, pages 162-167, 1986.
    • (1986) Proceedings of FOCS , pp. 162-167
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.