메뉴 건너뛰기




Volumn 7, Issue 3, 2012, Pages 1053-1066

Generating private recommendations efficiently using homomorphic encryption and data packing

Author keywords

Homomorphic encryption; Privacy; Recommender systems; Secure multiparty computation

Indexed keywords

DATA PACKING; DATA PROTECTION; EFFICIENT SYSTEMS; HOMOMORPHIC-ENCRYPTIONS; ON-LINE SERVICE; PERSONALIZATIONS; PRIVACY PRESERVING; PRIVACY RISKS; PRIVATE DATA; SECURE MULTI-PARTY COMPUTATION; SECURE TRANSMISSION; SEMI-TRUSTED THIRD PARTIES; SERVICE PROVIDER; THIRD PARTIES;

EID: 84861133582     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2012.2190726     Document Type: Article
Times cited : (202)

References (33)
  • 1
  • 2
    • 20844435854 scopus 로고    scopus 로고
    • Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions
    • DOI 10.1109/TKDE.2005.99
    • G. Adomavicius and A. Tuzhilin, "Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions," IEEE Trans. Knowl. Data Eng., vol. 17, no. 6, pp. 734-749, Jun. 2005. (Pubitemid 40860454)
    • (2005) IEEE Transactions on Knowledge and Data Engineering , vol.17 , Issue.6 , pp. 734-749
    • Adomavicius, G.1    Tuzhilin, A.2
  • 5
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-preserving data mining
    • May
    • R. Agrawal and R. Srikant, "Privacy-preserving data mining," in Proc. SIGMOD Rec., May 2000, vol. 29, pp. 439-450.
    • (2000) Proc. SIGMOD Rec. , vol.29 , pp. 439-450
    • Agrawal, R.1    Srikant, R.2
  • 6
    • 84974555530 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Springer-Verlag
    • Y. Lindell and B. Pinkas, "Privacy preserving data mining," J. Cryptol., pp. 36-54, 2000, Springer-Verlag.
    • (2000) J. Cryptol. , pp. 36-54
    • Lindell, Y.1    Pinkas, B.2
  • 7
    • 46749122242 scopus 로고    scopus 로고
    • Privacy-preserving collaborative filtering using randomized perturbation techniques
    • H. Polat and W. Du, "Privacy-preserving collaborative filtering using randomized perturbation techniques.," in Proc. ICDM, 2003, pp. 625-628.
    • (2003) Proc. ICDM , pp. 625-628
    • Polat, H.1    Du, W.2
  • 8
    • 33644514610 scopus 로고    scopus 로고
    • SVD-based collaborative filtering with privacy
    • New York, NY ACM Press
    • H. Polat andW. Du, "SVD-based collaborative filtering with privacy," in Proc. 2005 ACM Symp. Applied Computing (SAC'05), New York, NY, 2005, pp. 791-795, ACM Press.
    • (2005) Proc. 2005 ACM Symp. Applied Computing (SAC'05) , pp. 791-795
    • Polat, H.1    Du, W.2
  • 14
    • 0036082701 scopus 로고    scopus 로고
    • Collaborative filtering with privacy
    • J. F. Canny, "Collaborative filtering with privacy.," in IEEE Symp. Security and Privacy, 2002, pp. 45-57.
    • (2002) IEEE Symp. Security and Privacy , pp. 45-57
    • Canny, J.F.1
  • 15
    • 0036993076 scopus 로고    scopus 로고
    • Collaborative filtering with privacy via factor analysis
    • New York, NY: ACM Press
    • J. F. Canny, "Collaborative filtering with privacy via factor analysis," in SIGIR. New York, NY: ACM Press, 2002, pp. 238-245.
    • (2002) SIGIR , pp. 238-245
    • Canny, J.F.1
  • 19
    • 77249117753 scopus 로고    scopus 로고
    • Composite signal representation for fast and storage-efficient processing of encrypted signals
    • Mar.
    • T. Bianchi, A. Piva, and M. Barni, "Composite signal representation for fast and storage-efficient processing of encrypted signals," IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 180-187, Mar. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.1 , pp. 180-187
    • Bianchi, T.1    Piva, A.2    Barni, M.3
  • 20
    • 33645593031 scopus 로고    scopus 로고
    • Foundations of cryptography
    • 1st ed. Cambridge, U.K.: Cambridge Univ. Press May ISBN 0-521-83084-2
    • O. Goldreich, Foundations of Cryptography. Basic Applications, 1st ed. Cambridge, U.K.: Cambridge Univ. Press, May 2004, vol. 2, ISBN 0-521-83084-2.
    • (2004) Basic Applications , vol.2
    • Goldreich, O.1
  • 22
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Proc. Advances in Cryptology (EUROCRYPT' 99), ser J. Stern, Ed. May 2-6 Springer
    • P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Proc. Advances in Cryptology (EUROCRYPT' 99), ser. LNCS, J. Stern, Ed., May 2-6, 1999, vol. 1592, pp. 223-238, Springer.
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 23
    • 38149074802 scopus 로고    scopus 로고
    • Efficient and secure comparison for on-line auctions
    • Proc. Australasian Conf. Information Security and Privacy (ACSIP 2007), ser J. Pieprzyk, H. Ghodosi, and E. Dawson, Eds., Jul. 2-4 Springer
    • I. Damgård, M. Geisler, and M. Krøigaard, "Efficient and secure comparison for on-line auctions," in Proc. Australasian Conf. Information Security and Privacy (ACSIP 2007), ser. LNCS, J. Pieprzyk, H. Ghodosi, and E. Dawson, Eds., Jul. 2-4, 2007, vol. 4586, pp. 416-430, Springer.
    • (2007) LNCS , vol.4586 , pp. 416-430
    • Damgård, I.1    Geisler, M.2    Krøigaard, M.3
  • 28
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Jul.
    • T. E. Gamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inf. Theory, vol. 31, no. 4, pp. 469-472, Jul. 1985.
    • (1985) IEEE Trans. Inf. Theory , vol.31 , Issue.4 , pp. 469-472
    • Gamal, T.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.