메뉴 건너뛰기




Volumn 6809 LNCS, Issue , 2011, Pages 432-450

Privacy preserving group linkage

Author keywords

Group linkage; privacy; secure multi party computation

Indexed keywords

GROUP LINKAGE; GROUP MEMBERSHIPS; PRIVACY PRESERVING; PROBLEM OF PRIVACY; RECORD LINKAGE; SECURE MULTI-PARTY COMPUTATION;

EID: 79961178919     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-22351-8_27     Document Type: Conference Paper
Times cited : (7)

References (28)
  • 2
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-DNF formulas on ciphertexts
    • Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
    • Boneh, D., Goh, E.J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325-341. Springer, Heidelberg (2005) (Pubitemid 41231172)
    • (2005) Lecture Notes in Computer Science , vol.3378 , pp. 325-341
    • Boneh, D.1    Goh, E.-J.2    Nissim, K.3
  • 4
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • Cachin, C., Camenisch, J.L. (eds.) Springer, Heidelberg
    • Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
    • (2004) EUROCRYPT 2004. LNCS , vol.3027 , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 5
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Blakely, G.R., Chaum, D. (eds.) Springer, Heidelberg
    • El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10-18. Springer, Heidelberg (1985)
    • (1985) CRYPTO 1984. LNCS , vol.196 , pp. 10-18
    • El Gamal, T.1
  • 6
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • ACM, New York
    • Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC, pp. 169- 178. ACM, New York (2009)
    • (2009) STOC , pp. 169-178
    • Gentry, C.1
  • 7
    • 24944523186 scopus 로고    scopus 로고
    • On private scalar product computation for privacy-preserving data mining
    • Information Security and Cryptology - ICISC 2004: 7th International Conference, Revised Selected Papers
    • Goethals, B., Laur, S., Lipmaa, H., Mielik̈ainen, T.: On private scalar product computation for privacy-preserving data mining. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 104-120. Springer, Heidelberg (2005) (Pubitemid 41322351)
    • (2005) Lecture Notes in Computer Science , vol.3506 , pp. 104-120
    • Goethals, B.1    Laur, S.2    Lipmaa, H.3    Mielikainen, T.4
  • 8
    • 0021941417 scopus 로고
    • The knowledge complexity of interactive proof-systems
    • Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. In: STOC 1985, pp. 291-304 (1985)
    • (1985) STOC 1985 , pp. 291-304
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 9
    • 79953162324 scopus 로고    scopus 로고
    • Merging the results of approximate match operations
    • Guha, S.: Merging the results of approximate match operations. In: VLDB, pp. 636-647 (2004)
    • (2004) VLDB , pp. 636-647
    • Guha, S.1
  • 10
    • 0242453381 scopus 로고    scopus 로고
    • Coma - A system for flexible combination of schema matching approaches
    • hai Do, H., Rahm, E.: Coma - a system for flexible combination of schema matching approaches. In: VLDB, pp. 610-621 (2002)
    • (2002) VLDB , pp. 610-621
    • Hai Do, H.1    Rahm, E.2
  • 11
    • 78049382188 scopus 로고    scopus 로고
    • Privacy-preserving record linkage
    • Domingo-Ferrer, J., Magkos, E. (eds.) Springer, Heidelberg
    • Hall, R., Fienberg, S.E.: Privacy-preserving record linkage. In: Domingo-Ferrer, J., Magkos, E. (eds.) PSD 2010. LNCS, vol. 6344, pp. 269-283. Springer, Heidelberg (2010)
    • PSD 2010. LNCS , vol.6344 , Issue.2010 , pp. 269-283
    • Hall, R.1    Fienberg, S.E.2
  • 12
    • 84976856849 scopus 로고
    • The merge/purge problem for large databases
    • Herńandez, M.A., Stolfo, S.J.: The merge/purge problem for large databases. In: SIGMOD (1995)
    • (1995) SIGMOD
    • Herńandez, M.A.1    Stolfo, S.J.2
  • 14
    • 77952279809 scopus 로고    scopus 로고
    • Private record matching using differential privacy
    • Inan, A., Kantarcioglu, M., Ghinita, G., Bertino, E.: Private record matching using differential privacy. In: EDBT, pp. 123-134 (2010)
    • (2010) EDBT , pp. 123-134
    • Inan, A.1    Kantarcioglu, M.2    Ghinita, G.3    Bertino, E.4
  • 15
    • 0001368373 scopus 로고
    • Etude comparative de la distribution florale dans une portion des alpes et des jura
    • Jaccard, P.: Etude comparative de la distribution florale dans une portion des alpes et des jura. Bulletin del la Socíet́e Vaudoise des Sciences Naturelles 37, 547-579 (1901)
    • (1901) Bulletin Del la Socíet́e Vaudoise des Sciences Naturelles , vol.37 , pp. 547-579
    • Jaccard, P.1
  • 17
    • 77955176662 scopus 로고    scopus 로고
    • Efficient privacy-preserving similar document detection
    • 10.1007/s00778-009-0175-9
    • Murugesan, M., Jiang, W., Clifton, C., Si, L., Vaidya, J.: Efficient privacy-preserving similar document detection. The VLDB Journal 19, 457-475 (2010) 10.1007/s00778-009-0175-9
    • (2010) The VLDB Journal , vol.19 , pp. 457-475
    • Murugesan, M.1    Jiang, W.2    Clifton, C.3    Si, L.4    Vaidya, J.5
  • 18
    • 0032218237 scopus 로고    scopus 로고
    • A new public key cryptosystem based on higher residues
    • ACM, New York
    • Naccache, D., Stern, J.: A new public key cryptosystem based on higher residues. In: CCS, pp. 59-66. ACM, New York (1998)
    • (1998) CCS , pp. 59-66
    • Naccache, D.1    Stern, J.2
  • 20
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Stern, J. (ed.) Springer, Heidelberg
    • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
    • (1999) EUROCRYPT 1999. LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 21
    • 31144478622 scopus 로고    scopus 로고
    • Efficient public-key cryptosystems provably secure against active adversaries
    • Lam, K.-Y., Okamoto, E., Xing, C. (eds.) Springer, Heidelberg
    • Paillier, P., Pointcheval, D.: Efficient public-key cryptosystems provably secure against active adversaries. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASI-ACRYPT 1999. LNCS, vol. 1716, pp. 165-179. Springer, Heidelberg (1999)
    • (1999) ASI-ACRYPT 1999. LNCS , vol.1716 , pp. 165-179
    • Paillier, P.1    Pointcheval, D.2
  • 23
    • 70350639694 scopus 로고    scopus 로고
    • Social influence analysis in large-scale networks
    • Tang, J., Sun, J., Wang, C., Yang, Z.: Social influence analysis in large-scale networks. In: KDD, pp. 807-816 (2009)
    • (2009) KDD , pp. 807-816
    • Tang, J.1    Sun, J.2    Wang, C.3    Yang, Z.4
  • 24
    • 0242456803 scopus 로고    scopus 로고
    • Learning domain-independent string transformation weights for high accuracy object identification
    • Tejada, S., Knoblock, C.A.: Learning domain-independent string transformation weights for high accuracy object identification. In: ACM SIGKDD, pp. 350-359 (2002)
    • (2002) ACM SIGKDD , pp. 350-359
    • Tejada, S.1    Knoblock, C.A.2
  • 25
    • 77954642756 scopus 로고    scopus 로고
    • Fully homomorphic encryption over the integers
    • Gilbert, H. (ed.) Springer, Heidelberg
    • van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24-43. Springer, Heidelberg (2010)
    • EUROCRYPT 2010. LNCS , vol.6110 , Issue.2010 , pp. 24-43
    • Van Dijk, M.1    Gentry, C.2    Halevi, S.3    Vaikuntanathan, V.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.