메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; DISTRIBUTED DATABASE SYSTEMS; NETWORK SECURITY; SCALABILITY;

EID: 79960885939     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (56)

References (32)
  • 2
    • 35048875418 scopus 로고    scopus 로고
    • Secure Computation of the kth-Ranked Element
    • Springer
    • G. Aggarwal, N. Mishra, and B. Pinkas. Secure Computation of the kth-Ranked Element. In EUROCRYPT 2004, LNCS 3027, pages 40–55. Springer, 2004.
    • (2004) EUROCRYPT 2004, LNCS 3027 , pp. 40-55
    • Aggarwal, G.1    Mishra, N.2    Pinkas, B.3
  • 4
    • 1142303699 scopus 로고    scopus 로고
    • Information Sharing Across Private Databases
    • ACM
    • R. Agrawal, A. V. Evfimievski, and R. Srikant. Information Sharing Across Private Databases. In SIG-MOD 2003, pages 86–97. ACM, 2003.
    • (2003) SIG-MOD 2003 , pp. 86-97
    • Agrawal, R.1    Evfimievski, A. V.2    Srikant, R.3
  • 6
    • 38149068986 scopus 로고    scopus 로고
    • Deterministic and Efficiently Searchable Encryption
    • Springer
    • M. Bellare, A. Boldyreva, and A. O’Neill. Deterministic and Efficiently Searchable Encryption. In CRYPTO, LNCS 4622, pages 535–552. Springer, 2007.
    • (2007) CRYPTO, LNCS , vol.4622 , pp. 535-552
    • Bellare, M.1    Boldyreva, A.2    O’Neill, A.3
  • 7
    • 0027726717 scopus 로고
    • Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
    • M. Bellare and P. Rogaway. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In CCS 1993, pages 62–73, 1993.
    • (1993) CCS 1993 , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 9
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-DNF Formulas on Ciphertexts
    • D. Boneh, E.-J. Goh, and K. Nissim. Evaluating 2-DNF Formulas on Ciphertexts. In TCC 2005, pages 325–341, 2005.
    • (2005) TCC 2005 , pp. 325-341
    • Boneh, D.1    Goh, E.-J.2    Nissim, K.3
  • 11
    • 33750696320 scopus 로고    scopus 로고
    • Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data
    • Springer
    • J. W. Byun, H. S. Rhee, H.-A. Park, and D. H. Lee. Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data. In Secure Data Management, LNCS 4165, pages 75–83. Springer, 2006.
    • (2006) Secure Data Management, LNCS 4165 , pp. 75-83
    • Byun, J. W.1    Rhee, H. S.2    Park, H.-A.3    Lee, D. H.4
  • 12
    • 24144481228 scopus 로고    scopus 로고
    • A Verifiable Random Function with Short Proofs and Keys
    • Springer
    • Y. Dodis and A. Yampolskiy. A Verifiable Random Function with Short Proofs and Keys. In PKC 2005, LNCS 3386, pages 416–431. Springer, 2005.
    • (2005) PKC 2005, LNCS 3386 , pp. 416-431
    • Dodis, Y.1    Yampolskiy, A.2
  • 13
    • 33749610153 scopus 로고    scopus 로고
    • Privacy Preserving Query Processing Using Third Parties
    • page IEEE Computer Society
    • F. Emekçi, D. Agrawal, A. E. Abbadi, and A. Gulbeden. Privacy Preserving Query Processing Using Third Parties. In ICDE 2006, page 27. IEEE Computer Society, 2006.
    • (2006) ICDE 2006 , pp. 27
    • Emekçi, F.1    Agrawal, D.2    Abbadi, A. E.3    Gulbeden, A.4
  • 15
    • 24144488603 scopus 로고    scopus 로고
    • Keyword Search and Oblivious Pseudorandom Functions
    • M. J. Freedman, Y. Ishai, B. Pinkas, and O. Reingold. Keyword Search and Oblivious Pseudorandom Functions. In TCC 2005, pages 303–324, 2005.
    • (2005) TCC 2005 , pp. 303-324
    • Freedman, M. J.1    Ishai, Y.2    Pinkas, B.3    Reingold, O.4
  • 16
  • 19
    • 0023545076 scopus 로고
    • How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority
    • ACM
    • O. Goldreich, S. Micali, and A. Wigderson. How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority. In STOC 1987, pages 218–229. ACM, 1987.
    • (1987) STOC 1987 , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 20
    • 0024611659 scopus 로고
    • The Knowledge Complexity of Interactive Proof Systems
    • S. Goldwasser, S. Micali, and C. Rackoff. The Knowledge Complexity of Interactive Proof Systems. SIAM J. Comput., 18(1):186–208, 1989.
    • (1989) SIAM J. Comput , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 21
    • 40249108370 scopus 로고    scopus 로고
    • Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
    • C. Hazay and Y. Lindell. Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. In TCC 2008, pages 155–175, 2008.
    • (2008) TCC 2008 , pp. 155-175
    • Hazay, C.1    Lindell, Y.2
  • 23
    • 38049094878 scopus 로고    scopus 로고
    • Privacy-Preserving Set Operations
    • Springer
    • L. Kissner and D. X. Song. Privacy-Preserving Set Operations. In CRYPTO 2005, LNCS 3621, pages 241–257. Springer, 2005.
    • (2005) CRYPTO 2005, LNCS 3621 , pp. 241-257
    • Kissner, L.1    Song, D. X.2
  • 24
    • 33746437508 scopus 로고    scopus 로고
    • Privacy Preserving Data Mining
    • Y. Lindell and B. Pinkas. Privacy Preserving Data Mining. J. Cryptology, 15(3):177–206, 2002.
    • (2002) J. Cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 26
    • 85104009590 scopus 로고    scopus 로고
    • On Security of Sovereign Joins
    • Cryptology ePrint Archive, Report 2006/380
    • E. Mykletun and G. Tsudik. On Security of Sovereign Joins. Cryptology ePrint Archive, Report 2006/380, 2006.
    • (2006)
    • Mykletun, E.1    Tsudik, G.2
  • 27
    • 84883898504 scopus 로고    scopus 로고
    • Privacy Preserving Auctions and Mechanism Design
    • ACM
    • M. Naor, B. Pinkas, and R. Sumner. Privacy Preserving Auctions and Mechanism Design. In Electronic Commerce 1999, pages 129–139. ACM, 1999.
    • (1999) Electronic Commerce 1999 , pp. 129-139
    • Naor, M.1    Pinkas, B.2    Sumner, R.3
  • 29
    • 84942550998 scopus 로고    scopus 로고
    • Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
    • Springer
    • P. Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In EUROCRYPT 99, LNCS 1592, pages 223–238. Springer, 1999.
    • (1999) EUROCRYPT 99, LNCS 1592 , pp. 223-238
    • Paillier, P.1
  • 32
    • 28444436573 scopus 로고    scopus 로고
    • Privacy-Preserving Top-K Queries
    • IEEE Computer Society
    • J. Vaidya and C. Clifton. Privacy-Preserving Top-K Queries. In ICDE 2005, pages 545–546. IEEE Computer Society, 2005.
    • (2005) ICDE 2005 , pp. 545-546
    • Vaidya, J.1    Clifton, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.