메뉴 건너뛰기




Volumn 1, Issue , 2008, Pages 265-276

Practical private computation and zero-knowledge tools for privacy-preserving distributed data mining

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; DATA PRIVACY; K-MEANS CLUSTERING; LEARNING ALGORITHMS; MACHINE LEARNING; MAXIMUM PRINCIPLE;

EID: 52649158733     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1137/1.9781611972788.24     Document Type: Conference Paper
Times cited : (16)

References (36)
  • 1
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-preserving data mining
    • ACM Press
    • R. Agrawal and R. Srikant. Privacy-preserving data mining. In SIGMOD '00, pages 439-450. ACM Press, 2000.
    • (2000) SIGMOD '00 , pp. 439-450
    • Agrawal, R.1    Srikant, R.2
  • 2
    • 33244468835 scopus 로고    scopus 로고
    • Practical privacy: The SuLQ framework
    • New York, NY, USA, ACM Press
    • A. Blum, C. Dwork, F. McSherry, and K. Nissim. Practical privacy: the SuLQ framework. In PODS '05, pages 128-138, New York, NY, USA, 2005. ACM Press.
    • (2005) PODS '05 , pp. 128-138
    • Blum, A.1    Dwork, C.2    McSherry, F.3    Nissim, K.4
  • 3
    • 0036082701 scopus 로고    scopus 로고
    • Collaborative filtering with privacy
    • Oakland, CA, May
    • J. Canny. Collaborative filtering with privacy. In IEEE Symposium on Security and Privacy, pages 45-57, Oakland, CA, May 2002.
    • (2002) IEEE Symposium on Security and Privacy , pp. 45-57
    • Canny, J.1
  • 4
    • 0036993076 scopus 로고    scopus 로고
    • Collaborative filtering with privacy via factor analysis
    • ACM Press
    • J. Canny. Collaborative filtering with privacy via factor analysis. In SIGIR '02, pages 238-245. ACM Press, 2002.
    • (2002) SIGIR '02 , pp. 238-245
    • Canny, J.1
  • 7
    • 22044443106 scopus 로고    scopus 로고
    • Zero-knowledge proof for finite field arithmetic, or: Can zero-knowledge be for free?
    • Springer-Verlag
    • R. Cramer and I. Damgård. Zero-knowledge proof for finite field arithmetic, or: Can zero-knowledge be for free? In CRYPTO '98. Springer-Verlag, 1998.
    • (1998) CRYPTO '98
    • Cramer, R.1    Damgård, I.2
  • 8
    • 84945124606 scopus 로고    scopus 로고
    • Multiparty computation from threshold homomorphic encryption
    • Springer-Verlag
    • R. Cramer, I. Damgård, and J. B. Nielsen. Multiparty computation from threshold homomorphic encryption. In EUROCRYPT '01, pages 280-299. Springer-Verlag, 2001.
    • (2001) EUROCRYPT '01 , pp. 280-299
    • Cramer, R.1    Damgård, I.2    Nielsen, J.B.3
  • 9
    • 35348914807 scopus 로고    scopus 로고
    • Google news personalization: Scalable online collaborative filtering
    • New York, NY, USA, ACM Press
    • A. S. Das, M. Datar, A. Garg, and S. Rajaram. Google news personalization: scalable online collaborative filtering. In WWW '07, pages 271-280, New York, NY, USA, 2007. ACM Press.
    • (2007) WWW '07 , pp. 271-280
    • Das, A.S.1    Datar, M.2    Garg, A.3    Rajaram, S.4
  • 10
    • 1142275486 scopus 로고    scopus 로고
    • Revealing information while preserving privacy
    • New York, NY, USA, ACM Press
    • I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS '03, pages 202-210, New York, NY, USA, 2003. ACM Press.
    • (2003) PODS '03 , pp. 202-210
    • Dinur, I.1    Nissim, K.2
  • 11
    • 2942529194 scopus 로고    scopus 로고
    • Privacy-preserving multivariate statistical analysis: Linear regression and classification
    • W. Du, Y. Han, and S. Chen. Privacy-preserving multivariate statistical analysis: Linear regression and classification. In SIAM International Conference on Data Mining, pages 222-233, 2004.
    • (2004) SIAM International Conference on Data Mining , pp. 222-233
    • Du, W.1    Han, Y.2    Chen, S.3
  • 12
    • 77952334884 scopus 로고    scopus 로고
    • Using randomized response techniques for privacy-preserving data mining
    • ACM Press
    • W. Du and Z. Zhan. Using randomized response techniques for privacy-preserving data mining. In KDD '03, pages 505-510. ACM Press, 2003.
    • (2003) KDD '03 , pp. 505-510
    • Du, W.1    Zhan, Z.2
  • 13
    • 33751096728 scopus 로고    scopus 로고
    • Zero-knowledge test of vector equivalence and granulation of user data with privacy
    • Y. Duan and J. Canny. Zero-knowledge test of vector equivalence and granulation of user data with privacy. In IEEE GrC 2006, 2006.
    • (2006) IEEE GrC 2006
    • Duan, Y.1    Canny, J.2
  • 15
    • 33745556605 scopus 로고    scopus 로고
    • Calibrating noise to sensitivity in private data analysis
    • TCC 2006, of, Springer
    • C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC 2006, volume 3876 of LNCS, pages 265-284. Springer, 2006.
    • (2006) LNCS , vol.3876 , pp. 265-284
    • Dwork, C.1    McSherry, F.2    Nissim, K.3    Smith, A.4
  • 16
    • 1142263341 scopus 로고    scopus 로고
    • Limiting privacy breaches in privacy preserving data mining
    • ACM Press
    • A. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data mining. In PODS '03, pages 211-222. ACM Press, 2003.
    • (2003) PODS '03 , pp. 211-222
    • Evfimievski, A.1    Gehrke, J.2    Srikant, R.3
  • 17
    • 33746018016 scopus 로고    scopus 로고
    • General adversaries in unconditional multi-party computation
    • ASIACRYPT 99, of, Springer-Verlag
    • M. Fitzi, M. Hirt, and U. Maurer. General adversaries in unconditional multi-party computation. In ASIACRYPT 99, volume 1716 of LNCS, pages 232-246. Springer-Verlag, 1999.
    • (1999) LNCS , vol.1716 , pp. 232-246
    • Fitzi, M.1    Hirt, M.2    Maurer, U.3
  • 18
    • 0031628398 scopus 로고    scopus 로고
    • Simplified vss and fast-track multiparty computations with applications to threshold cryptography
    • ACM Press
    • R. Gennaro, M. O. Rabin, and T. Rabin. Simplified vss and fast-track multiparty computations with applications to threshold cryptography. In PODC '98, pages 101-111. ACM Press, 1998.
    • (1998) PODC '98 , pp. 101-111
    • Gennaro, R.1    Rabin, M.O.2    Rabin, T.3
  • 19
    • 52649144240 scopus 로고    scopus 로고
    • O. Goldreich. Foundations of Cryptography: 2 Basic Applications. Cambridge University Press, 2004.
    • O. Goldreich. Foundations of Cryptography: Volume 2 Basic Applications. Cambridge University Press, 2004.
  • 20
    • 0028676264 scopus 로고
    • Definitions and properties of zero-knowledge proof systems
    • O. Goldreich and Y. Oren. Definitions and properties of zero-knowledge proof systems. Journal of Cryptology, 7(1):1-32, 1994.
    • (1994) Journal of Cryptology , vol.7 , Issue.1 , pp. 1-32
    • Goldreich, O.1    Oren, Y.2
  • 21
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM Journal on Computing, 18(1):186-208, 1989.
    • (1989) SIAM Journal on Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 22
    • 0030693496 scopus 로고    scopus 로고
    • Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract)
    • M. Hirt and U. Maurer. Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract). In PODC '97, pages 25-34, 1997.
    • (1997) PODC '97 , pp. 25-34
    • Hirt, M.1    Maurer, U.2
  • 23
    • 33745999816 scopus 로고    scopus 로고
    • Player simulation and general adversary structures in perfect multiparty computation
    • M. Hirt and U. Maurer. Player simulation and general adversary structures in perfect multiparty computation. Journal of Cryptology, 13(1):31-60, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 31-60
    • Hirt, M.1    Maurer, U.2
  • 24
    • 3042742744 scopus 로고    scopus 로고
    • Latent semantic models for collaborative filtering
    • T. Hofmann. Latent semantic models for collaborative filtering. ACM Transactions on Information Systems, 22(1):89-115, 2004.
    • (2004) ACM Transactions on Information Systems , vol.22 , Issue.1 , pp. 89-115
    • Hofmann, T.1
  • 25
    • 4544361334 scopus 로고    scopus 로고
    • Privacy-preserving distributed mining of association rules on horizontally partitioned data
    • M. Kantarcioglu and C. Clifton. Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Transactions on Knowledge and Data Engineering, 16(9):1026-1037, 2004.
    • (2004) IEEE Transactions on Knowledge and Data Engineering , vol.16 , Issue.9 , pp. 1026-1037
    • Kantarcioglu, M.1    Clifton, C.2
  • 26
    • 78149340011 scopus 로고    scopus 로고
    • H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar. On the privacy preserving properties of random data perturbation techniques. In ICDM '03, page 99, Washington, DC, USA, 2003. IEEE Computer Society.
    • H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar. On the privacy preserving properties of random data perturbation techniques. In ICDM '03, page 99, Washington, DC, USA, 2003. IEEE Computer Society.
  • 27
    • 0027188175 scopus 로고
    • Efficient noise-tolerant learning from statistical queries
    • New York, NY, USA, ACM Press
    • M. Kearns. Efficient noise-tolerant learning from statistical queries. In STOC '93, pages 392-401, New York, NY, USA, 1993. ACM Press.
    • (1993) STOC '93 , pp. 392-401
    • Kearns, M.1
  • 28
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Y. Lindell and B. Pinkas. Privacy preserving data mining. Journal of cryptology, 15(3):177-206, 2002.
    • (2002) Journal of cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 30
    • 84982943258 scopus 로고
    • Non-interactive and informationtheoretic secure verifiable secret sharing
    • CRYPTO '91, of, Springer-Verlag
    • T. Pedersen. Non-interactive and informationtheoretic secure verifiable secret sharing. In CRYPTO '91, volume 576 of Lecture Notes in Computer Science, pages 129-140. Springer-Verlag, 1991.
    • (1991) Lecture Notes in Computer Science , vol.576 , pp. 129-140
    • Pedersen, T.1
  • 33
    • 0242709355 scopus 로고    scopus 로고
    • Privacy preserving association rule mining in vertically partitioned data
    • New York, NY, USA, ACM Press
    • J. Vaidya and C. Clifton. Privacy preserving association rule mining in vertically partitioned data. In KDD '02, pages 639-644, New York, NY, USA, 2002. ACM Press.
    • (2002) KDD '02 , pp. 639-644
    • Vaidya, J.1    Clifton, C.2
  • 34
    • 77952332120 scopus 로고    scopus 로고
    • Privacy-preserving k-means clustering over vertically partitioned data
    • New York, NY, USA, ACM Press
    • J. Vaidya and C. Clifton. Privacy-preserving k-means clustering over vertically partitioned data. In KDD '03, pages 206-215, New York, NY, USA, 2003. ACM Press.
    • (2003) KDD '03 , pp. 206-215
    • Vaidya, J.1    Clifton, C.2
  • 35
    • 12244255356 scopus 로고    scopus 로고
    • Privacy-preserving bayesian network structure computation on distributed heterogeneous data
    • New York, NY, USA, ACM Press
    • R. Wright and Z. Yang. Privacy-preserving bayesian network structure computation on distributed heterogeneous data. In KDD '04, pages 713-718, New York, NY, USA, 2004. ACM Press.
    • (2004) KDD '04 , pp. 713-718
    • Wright, R.1    Yang, Z.2
  • 36
    • 84880121624 scopus 로고    scopus 로고
    • Privacy-preserving classification of customer data without loss of accuracy
    • Z. Yang, S. Zhong, and R. N. Wright. Privacy-preserving classification of customer data without loss of accuracy. In SDM 2005, 2005.
    • (2005) SDM 2005
    • Yang, Z.1    Zhong, S.2    Wright, R.N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.