메뉴 건너뛰기




Volumn 27, Issue 4, 2011, Pages 669-691

Secure multiple linear regression based on homomorphic encryption

Author keywords

Combining data sources; Confidentiality; Homomorphic encryption; Privacypreserving statistical calculation; Secure multi party computation

Indexed keywords


EID: 80955145180     PISSN: 0282423X     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (130)

References (30)
  • 1
    • 79960844353 scopus 로고    scopus 로고
    • Strong Conditional Oblivious Transfer and Computing on Intervals
    • Blake, I. and Kolesnikov, V. (2004). Strong Conditional Oblivious Transfer and Computing on Intervals. Advances in Cryptology--ASIACRYPT, 2004, 515-529.
    • (2004) Advances In Cryptology--ASIACRYPT , vol.2004 , pp. 515-529
    • Blake, I.1    Kolesnikov, V.2
  • 7
    • 84972531331 scopus 로고
    • Enhancing Access to Microdata while Protecting Confidentiality: Prospects for the Future
    • Duncan, G.T. and Pearson, R.W. (1991). Enhancing Access to Microdata while Protecting Confidentiality: Prospects for the Future. Statistical Science, 6, 219-232.
    • (1991) Statistical Science , vol.6 , pp. 219-232
    • Duncan, G.T.1    Pearson, R.W.2
  • 11
  • 12
    • 26444451487 scopus 로고    scopus 로고
    • On Secure Scalar Product Computation for Privacy-preserving Data Mining
    • Goethals, B., Laur, S., Lipmaa, H., and Mielikainen, T. (2004). On Secure Scalar Product Computation for Privacy-preserving Data Mining. ISISC, 2004.
    • (2004) ISISC , pp. 2004
    • Goethals, B.1    Laur, S.2    Lipmaa, H.3    Mielikainen, T.4
  • 18
    • 77349092141 scopus 로고    scopus 로고
    • Privacy-preserving Analysis of Vertically Partitioned Data using Secure Matrix Products
    • Karr, A.F., Lin, X., Sanil, A.P., and Reiter, J.P. (2009). Privacy-preserving Analysis of Vertically Partitioned Data using Secure Matrix Products. Journal of Official Statistics, 25, 125-138.
    • (2009) Journal of Official Statistics , vol.25 , pp. 125-138
    • Karr, A.F.1    Lin, X.2    Sanil, A.P.3    Reiter, J.P.4
  • 19
    • 33746437508 scopus 로고    scopus 로고
    • Privacy Preserving Data Mining
    • Lindell, Y. and Pinkas, B. (2002). Privacy Preserving Data Mining. Journal of Cryptology, 15, 177-206.
    • (2002) Journal of Cryptology , vol.15 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 20
    • 70350674448 scopus 로고    scopus 로고
    • Private Data Analysis via Output Perturbation
    • Charu C. Aggarwal and P.S. Yu (eds). New York: Springer
    • Nissim, K. (2008). Private Data Analysis via Output Perturbation. In Privacy-Preserving Data Mining: Models and Algorithms, Charu C. Aggarwal and P.S. Yu (eds). New York: Springer, 385-416.
    • (2008) Privacy-Preserving Data Mining: Models and Algorithms , pp. 385-416
    • Nissim, K.1
  • 22
    • 56749150780 scopus 로고    scopus 로고
    • A Remote Analysis Server--What Does Regression Output Look Like?
    • PSD 2008, J. Domingo-Ferrer and Y. Saygin (eds). LNCS, Berlin: Springer
    • O'Keefe, C.M. and Good, N.M. (2008). A Remote Analysis Server--What Does Regression Output Look Like? Privacy in Statistical Databases, PSD 2008, J. Domingo-Ferrer and Y. Saygin (eds). LNCS 5262. Berlin: Springer, 270-283.
    • (2008) Privacy In Statistical Databases , vol.5262 , pp. 270-283
    • O'Keefe, C.M.1    Good, N.M.2
  • 23
    • 72049086690 scopus 로고    scopus 로고
    • Regression Output from a Remote Analysis Server
    • O'Keefe, C.M. and Good, N.M. (2009). Regression Output from a Remote Analysis Server. Data & Knowledge Engineering, 68, 1175-1186.
    • (2009) Data & Knowledge Engineering , vol.68 , pp. 1175-1186
    • O'Keefe, C.M.1    Good, N.M.2
  • 24
    • 84942550998 scopus 로고    scopus 로고
    • Public-key Cryptosystems based on Composite Degree Residuosity Classes
    • J. Stern (ed.). LNCS, Berlin: Springer-Verlag
    • Paillier, P. (1999). Public-key Cryptosystems based on Composite Degree Residuosity Classes. Advances in Cryptology (EUROCRYPT 1999), J. Stern (ed.). LNCS Vol. 1592. Berlin: Springer-Verlag, 223-238.
    • (1999) Advances In Cryptology (EUROCRYPT 1999) , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 25
    • 0346171307 scopus 로고    scopus 로고
    • Model Diagnostics for Remote-access Regression Servers
    • Reiter, J.P. (2003). Model Diagnostics for Remote-access Regression Servers. Statistics and Computing, 13, 371-380.
    • (2003) Statistics and Computing , vol.13 , pp. 371-380
    • Reiter, J.P.1
  • 30
    • 0020312165 scopus 로고
    • Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science
    • Yao, A.C. (1982). Protocols for Secure Computations. Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, 160-164.
    • (1982) Protocols For Secure Computations , pp. 160-164
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.