메뉴 건너뛰기




Volumn 4307 LNCS, Issue , 2006, Pages 210-227

Efficient protocols for privacy preserving matching against distributed datasets

Author keywords

Cryptographic protocol; Distributed database; Privacy preservation; Set intersection; Set matching

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 41549104640     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11935308_15     Document Type: Conference Paper
Times cited : (68)

References (24)
  • 1
    • 0035879575 scopus 로고    scopus 로고
    • A Fair and Efficient Solution to the Socialist Millionaires Problem
    • F. Boudot, B. Schoenmakers and J. Traor’e, “A Fair and Efficient Solution to the Socialist Millionaires’ Problem”, in Discrete Applied Mathematics, 111(1-2), pp. 23-36, 2001.
    • (2001) Discrete Applied Mathematics , vol.111 , Issue.1 , pp. 23-36
    • Boudot, F.1    Schoenmakers, B.2    Traor’E, J.3
  • 4
    • 0030150177 scopus 로고    scopus 로고
    • Comparing Information without Leaking It
    • R.Fagin, M.Naor, and P.Winkler, “Comparing Information without Leaking It”, in Communications of the ACM, 39(5): 77-85, 1996.
    • (1996) Communications of the ACM , vol.39 , Issue.5 , pp. 77-85
    • Fagin, R.1    Naor, M.2    Winkler, P.3
  • 7
    • 84946827596 scopus 로고    scopus 로고
    • Threshold Cryptosystems Secure against Chosenciphertext Attacks
    • P.Fouque and D.Pointcheval, “Threshold Cryptosystems Secure against Chosenciphertext Attacks”, in Proc. of Asiacrypt2001, pp. 351-368, 2001.
    • (2001) Proc. of Asiacrypt , vol.2001 , pp. 351-368
    • Fouque, P.1    Pointcheval, D.2
  • 9
    • 26444451487 scopus 로고    scopus 로고
    • On Secure Scalar Product Computation for Privacy-Preserving Data Mining
    • B.Goethals, S.Laur, H.Lipmaa, and T.Mielikainen, “On Secure Scalar Product Computation for Privacy-Preserving Data Mining”, in Proc. of ICISC, 2004.
    • (2004) Proc. of ICISC
    • Goethals, B.1    Laur, S.2    Lipmaa, H.3    Mielikainen, T.4
  • 13
    • 0141515461 scopus 로고    scopus 로고
    • On the Distribution of the Number of Roots of Polynomials and Explicit Weak Designs
    • T.Hartman and R.Raz, “On the Distribution of the Number of Roots of Polynomials and Explicit Weak Designs”, in Random Structures and Algorithms, Vol.23 (3), pp. 235 - 263, 2003.
    • (2003) Random Structures and Algorithms , vol.23 , Issue.3
    • Hartman, T.1    Raz, R.2
  • 16
    • 84937417083 scopus 로고    scopus 로고
    • Mix and Match: Secure Function Evaluation via Ciphertexts
    • M.Jakobsson, A.Juels, “Mix and Match: Secure Function Evaluation via Ciphertexts”, in ASIACRYPT2000, pp 162-177, 2000.
    • (2000) ASIACRYPT , vol.2000 , pp. 162-177
    • Jakobsson, M.1    Juels, A.2
  • 19
    • 0345058962 scopus 로고    scopus 로고
    • Verifiable Homomorphic Oblivious Transfer and private Equality Test
    • H.Lipmaa, “Verifiable Homomorphic Oblivious Transfer and private Equality Test”, in Advances in Cryptography ASIACRYPT2003, pp. 416-433, 2003.
    • (2003) Advances in Cryptography ASIACRYPT , pp. 416-433
    • Lipmaa, H.1
  • 21
    • 0000277371 scopus 로고    scopus 로고
    • Public-key Cryptosystems based on Composite Degree Residuosity Classes
    • P.Paillier, “Public-key Cryptosystems based on Composite Degree Residuosity Classes”, in Proc. of Asiacrypt2000, pp. 573-584, 2000.
    • (2000) Proc. of Asiacrypt , vol.2000 , pp. 573-584
    • Paillier, P.1
  • 22
    • 84990648258 scopus 로고
    • Efficient Generation of Random Nonsingular Matrices
    • D.Randall, “Efficient Generation of Random Nonsingular Matrices”, in Random Structures and Algorithms, vol. 4(1), pp. 111-118, 1993.
    • (1993) Random Structures and Algorithms , vol.4 , Issue.1 , pp. 111-118
    • Randall, D.1
  • 23
    • 39049098515 scopus 로고    scopus 로고
    • Design and Analysis of a Self-tuning Proportional and Integral Controller for Active Queue Management Routers to support TCP Flows
    • N.Xiong, X.Defago, X.Jia, Y.Yang, and Y.He, “Design and Analysis of a Self-tuning Proportional and Integral Controller for Active Queue Management Routers to support TCP Flows”, in Proc. of IEEE INFOCOM, 2006.
    • (2006) Proc. of IEEE INFOCOM
    • Xiong, N.1    Defago, X.2    Jia, X.3    Yang, Y.4    He, Y.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.