메뉴 건너뛰기




Volumn 5939 LNCS, Issue , 2010, Pages 33-47

Distributed privacy-preserving methods for statistical disclosure control

Author keywords

Homomorphic encryption; Privacy; Statistical disclosure control

Indexed keywords

CONFIDENTIAL INFORMATION; GLOBAL DATABASE; HOMOMORPHIC-ENCRYPTIONS; NOISE ADDITION; PERTURBATION METHOD; PRIVACY PRESERVING; PROTECTION METHODS; RESAMPLING; SENSITIVE INFORMATIONS; STATISTICAL DISCLOSURE CONTROL; STATISTICAL INFORMATION;

EID: 77951599720     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-11207-2_4     Document Type: Conference Paper
Times cited : (5)

References (20)
  • 1
    • 74049103179 scopus 로고    scopus 로고
    • Secure two-party k-means clustering
    • ACM Press, New York
    • Bunn, P., Ostrovsky, R.: Secure two-party k-means clustering. In: Proc. of CCS 2007, pp. 486-497. ACM Press, New York (2007)
    • (2007) Proc. of CCS 2007 , pp. 486-497
    • Bunn, P.1    Ostrovsky, R.2
  • 3
    • 84945124606 scopus 로고    scopus 로고
    • Multiparty computation from threshold homomorphic encryption
    • Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
    • Cramer, R., Damg̊ard, I.B., Nielsen, J.B.: Multiparty computation from threshold homomorphic encryption. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 280-299. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 280-299
    • Cramer, R.1    Damg̊ard, I.B.2    Nielsen, J.B.3
  • 5
    • 33745567199 scopus 로고    scopus 로고
    • Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
    • Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
    • Damg̊ard, I.B., Fitzi, M., Kiltz, E., Nielsen, J.B., Toft, T.: Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 285-304. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3876 , pp. 285-304
    • Damg̊ard, I.B.1    Fitzi, M.2    Kiltz, E.3    Nielsen, J.B.4    Toft, T.5
  • 11
    • 33746335051 scopus 로고    scopus 로고
    • Differential privacy
    • Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. Springer, Heidelberg
    • Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1-12. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4052 , pp. 1-12
    • Dwork, C.1
  • 12
    • 51849089628 scopus 로고    scopus 로고
    • New efficient attacks on statistical disclosure control mechanisms
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • Dwork, C., Yekhanin, S.: New efficient attacks on statistical disclosure control mechanisms. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 469-480. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 469-480
    • Dwork, C.1    Yekhanin, S.2
  • 13
    • 84944328129 scopus 로고    scopus 로고
    • Sharing decryption in the context of voting or lotteries
    • Frankel, Y. (ed.) FC 2000. Springer, Heidelberg
    • Fouque, P.A., Poupard, G., Stern, J.: Sharing decryption in the context of voting or lotteries. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 90-104. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.1962 , pp. 90-104
    • Fouque, P.A.1    Poupard, G.2    Stern, J.3
  • 16
    • 0002956175 scopus 로고
    • A method for limiting disclosure in microdata based on random noise and transformation
    • Kim, J.J.: A method for limiting disclosure in microdata based on random noise and transformation. In: Proc. of the ASA Section on Survey Research Methodology, pp. 303-308 (1986)
    • (1986) Proc. of the ASA Section on Survey Research Methodology , pp. 303-308
    • Kim, J.J.1
  • 17
    • 62249168275 scopus 로고    scopus 로고
    • Data access in a cyber world: Making use of cyberinfrastructure
    • Lane, J., Heus, P., Mulcahy, T.: Data access in a cyber world: making use of cyberinfrastructure. Transactions on Data Privacy 1(1), 2-16 (2008)
    • (2008) Transactions on Data Privacy , vol.1 , Issue.1 , pp. 2-16
    • Lane, J.1    Heus, P.2    Mulcahy, T.3
  • 18
    • 36048960434 scopus 로고    scopus 로고
    • Rethinking rank swapping to decrease disclosure risk
    • DOI 10.1016/j.datak.2007.07.006, PII S0169023X07001498, Fourth International Conference on Business Process Management (BPM 2006) Four selected and extended papers
    • Nin, J., Herranz, J., Torra, V.: Rethinking rank swapping to decrease disclosure risk. Data & Knowledge Engineering 64(1), 346-364 (2008) (Pubitemid 350087293)
    • (2008) Data and Knowledge Engineering , vol.64 , Issue.1 , pp. 346-364
    • Nin, J.1    Herranz, J.2    Torra, V.3
  • 19
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
    • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.