메뉴 건너뛰기




Volumn , Issue , 2013, Pages 334-348

Privacy-preserving ridge regression on hundreds of millions of records

Author keywords

[No Author keywords available]

Indexed keywords

BUILDING BLOCKES; COMPLETE SYSTEM; GARBLED CIRCUITS; HO-MOMORPHIC ENCRYPTIONS; MACHINE-LEARNING; NUMBER OF DATUM; PRIVACY PRESERVING; RIDGE REGRESSION;

EID: 84881255209     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2013.30     Document Type: Conference Paper
Times cited : (438)

References (56)
  • 1
    • 0002531104 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distributed computation," in ACM STOC, 1988.
    • (1988) ACM STOC
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 2
    • 77954592905 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • C. Gentry, "Fully homomorphic encryption using ideal lattices," in ACM STOC, 2009.
    • (2009) ACM STOC
    • Gentry, C.1
  • 4
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Springer
    • P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Advances in Cryptology - EUROCRYPT '99. Springer, 1999.
    • (1999) Advances in Cryptology - EUROCRYPT '99
    • Paillier, P.1
  • 5
    • 70349309809 scopus 로고    scopus 로고
    • On lattices, learning with errors, random linear codes, and cryptography
    • O. Regev, "On lattices, learning with errors, random linear codes, and cryptography," J. ACM, vol. 56, no. 6, 2009.
    • (2009) J. ACM , vol.56 , Issue.6
    • Regev, O.1
  • 6
    • 84914127581 scopus 로고    scopus 로고
    • Faster secure two-party computation using garbled circuits
    • USENIX Association
    • Y. Huang, D. Evans, J. Katz, and L. Malka, "Faster secure two-party computation using garbled circuits," in 20th USENIX Security Symposium. USENIX Association, 2011.
    • (2011) 20th USENIX Security Symposium
    • Huang, Y.1    Evans, D.2    Katz, J.3    Malka, L.4
  • 8
    • 80955145180 scopus 로고    scopus 로고
    • Secure multiple linear regression based on homomorphic encryption
    • R. Hall, S. E. Fienberg, and Y. Nardi, "Secure multiple linear regression based on homomorphic encryption," J. Official Statistics, vol. 27, no. 4, 2011.
    • (2011) J. Official Statistics , vol.27 , Issue.4
    • Hall, R.1    Fienberg, S.E.2    Nardi, Y.3
  • 9
    • 73849126104 scopus 로고    scopus 로고
    • Security against covert adversaries: Efficient protocols for realistic adversaries
    • Y. Aumann and Y. Lindell, "Security against covert adversaries: Efficient protocols for realistic adversaries," J. Cryptology, vol. 23, no. 2, 2010.
    • (2010) J. Cryptology , vol.23 , Issue.2
    • Aumann, Y.1    Lindell, Y.2
  • 10
    • 85071736958 scopus 로고
    • Communication complexity of secure computation
    • M. K. Franklin and M. Yung, "Communication complexity of secure computation," in ACM STOC, 1992.
    • (1992) ACM STOC
    • Franklin, M.K.1    Yung, M.2
  • 12
    • 64249101946 scopus 로고    scopus 로고
    • A proof of security of Yao's protocol for two-party computation
    • Y. Lindell and B. Pinkas, "A proof of security of Yao's protocol for two-party computation," J. Cryptology, vol. 22, no. 2, 2009.
    • (2009) J. Cryptology , vol.22 , Issue.2
    • Lindell, Y.1    Pinkas, B.2
  • 14
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • S. Even, O. Goldreich, and A. Lempel, "A randomized protocol for signing contracts," Commun. ACM, vol. 28, no. 6, 1985.
    • (1985) Commun. ACM , vol.28 , Issue.6
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 17
    • 0002908662 scopus 로고    scopus 로고
    • A generalisation, a simplification and some applications of Paillier's probabilistic public-key system
    • Springer
    • I. Damgård and M. Jurik, "A generalisation, a simplification and some applications of Paillier's probabilistic public-key system," in Public-Key Cryptography - PKC 2001. Springer, 2001.
    • (2001) Public-Key Cryptography - PKC 2001
    • Damgård, I.1    Jurik, M.2
  • 18
    • 0000845043 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • T. P. Pedersen, "Non-interactive and information-theoretic secure verifiable secret sharing," in CRYPTO'91, 1992.
    • (1992) CRYPTO'91
    • Pedersen, T.P.1
  • 19
    • 0011390710 scopus 로고    scopus 로고
    • Proving in zero-knowledge that a number is the product of two safe primes
    • Springer
    • J. Camenisch and M. Michels, "Proving in zero-knowledge that a number is the product of two safe primes," in Advances in Cryptology - EUROCRYPT '99. Springer, 1999.
    • (1999) Advances in Cryptology - EUROCRYPT '99
    • Camenisch, J.1    Michels, M.2
  • 20
    • 0002681959 scopus 로고
    • Untraceable off-line cash in wallets with observers
    • Springer
    • S. Brands, "Untraceable off-line cash in wallets with observers," in CRYPTO'93. Springer, 1994.
    • (1994) CRYPTO'93
    • Brands, S.1
  • 21
    • 0001853827 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • Springer
    • R. Cramer, I. Damgård, and B. Schoenmakers, "Proofs of partial knowledge and simplified design of witness hiding protocols," in CRYPTO'94. Springer, 1994.
    • (1994) CRYPTO'94
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 22
    • 0000097412 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Springer
    • A. Fiat and A. Shamir, "How to prove yourself: Practical solutions to identification and signature problems," in CRYPTO'86. Springer, 1987.
    • (1987) CRYPTO'86
    • Fiat, A.1    Shamir, A.2
  • 23
    • 79960854270 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • Springer
    • R. Gennaro, C. Gentry, and B. Parno, "Non-interactive verifiable computing: Outsourcing computation to untrusted workers," in CRYPTO 2010. Springer, 2010.
    • (2010) CRYPTO 2010
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 27
    • 84869443834 scopus 로고    scopus 로고
    • Improved garbled circuit building blocks and applications to auctions and computing minima
    • Springer
    • V. Kolesnikov, A.-R. Sadeghi, and T. Schneider, "Improved garbled circuit building blocks and applications to auctions and computing minima," in Cryptology and Network Security (CANS). Springer, 2009.
    • (2009) Cryptology and Network Security (CANS)
    • Kolesnikov, V.1    Sadeghi, A.-R.2    Schneider, T.3
  • 31
    • 84889076745 scopus 로고    scopus 로고
    • Billion-gate secure computation with malicious adversaries
    • USENIX Association
    • B. Kreuter, A. Shelat, and C.-H. Shen, "Billion-gate secure computation with malicious adversaries," in 21st USENIX Security Symposium. USENIX Association, 2012.
    • (2012) 21st USENIX Security Symposium
    • Kreuter, B.1    Shelat, A.2    Shen, C.-H.3
  • 32
    • 84881219762 scopus 로고    scopus 로고
    • Implementing two-party computation efficiently with security against malicious adversaries
    • Springer
    • Y. Lindell, B. Pinkas, and N. P. Smart, "Implementing two-party computation efficiently with security against malicious adversaries," in Security and Cryptography for Networks (SCN). Springer, 2008.
    • (2008) Security and Cryptography for Networks (SCN)
    • Lindell, Y.1    Pinkas, B.2    Smart, N.P.3
  • 33
    • 84954474682 scopus 로고    scopus 로고
    • Efficiency tradeoffs for malicious two-party computation
    • Springer
    • P. Mohassel and M. Franklin, "Efficiency tradeoffs for malicious two-party computation," in Public-Key Cryptography (PKC). Springer, 2006.
    • (2006) Public-Key Cryptography (PKC)
    • Mohassel, P.1    Franklin, M.2
  • 35
    • 84881251369 scopus 로고    scopus 로고
    • ML confidential: Machine learning on encrypted data
    • Report 2012/323
    • T. Graepel, K. Lauter, and M. Naehrig, "ML confidential: Machine learning on encrypted data," Cryptology ePrint Archive, Report 2012/323, 2012.
    • (2012) Cryptology EPrint Archive
    • Graepel, T.1    Lauter, K.2    Naehrig, M.3
  • 36
    • 0034312453 scopus 로고    scopus 로고
    • Minimal-storage high-performance Cholesky factorization via blocking and recursion
    • F. G. Gustavson and I. Jonsson, "Minimal-storage high-performance Cholesky factorization via blocking and recursion," IBM J. Res. Dev., vol. 44, 2000.
    • (2000) IBM J. Res. Dev. , vol.44
    • Gustavson, F.G.1    Jonsson, I.2
  • 38
    • 84881227777 scopus 로고    scopus 로고
    • Semuninumerical Algorithms
    • 3rd ed. Addison-Wesley
    • D. E. Knuth, The Art of Computer Programming, Vol. 2, Semuninumerical Algorithms, 3rd ed. Addison-Wesley, 1997.
    • (1997) The Art of Computer Programming , vol.2
    • Knuth, D.E.1
  • 40
    • 84881222587 scopus 로고    scopus 로고
    • Privacy preserving regression modelling via distributed computation
    • A. P. Sanil, A. F. Karr, X. Lin, and J. P. Reiter, "Privacy preserving regression modelling via distributed computation," in ACM KDD, 2004.
    • (2004) ACM KDD
    • Sanil, A.P.1    Karr, A.F.2    Lin, X.3    Reiter, J.P.4
  • 47
    • 77349092141 scopus 로고    scopus 로고
    • Privacy-preserving analysis of vertically partitioned data using secure matrix products
    • A. F. Karr, X. Lin, A. P. Sanil, and J. P. Reiter, "Privacy- preserving analysis of vertically partitioned data using secure matrix products," J. Official Statistics, vol. 25, no. 1, 2009.
    • (2009) J. Official Statistics , vol.25 , Issue.1
    • Karr, A.F.1    Lin, X.2    Sanil, A.P.3    Reiter, J.P.4
  • 53
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Y. Lindell and B. Pinkas, "Privacy preserving data mining," J. Cryptology, vol. 15, no. 3, 2002.
    • (2002) J. Cryptology , vol.15 , Issue.3
    • Lindell, Y.1    Pinkas, B.2
  • 55
    • 84881242599 scopus 로고    scopus 로고
    • Differential privacy and robust statistics
    • C. Dwork and J. Lei, "Differential privacy and robust statistics," in ACM STOC, 2009.
    • (2009) ACM STOC
    • Dwork, C.1    Lei, J.2
  • 56
    • 84881225673 scopus 로고    scopus 로고
    • Differentially private recommender systems: Building privacy into the Netflix prize contenders
    • F. McSherry and I. Mironov, "Differentially private recommender systems: Building privacy into the Netflix prize contenders," in ACM KDD, 2009.
    • (2009) ACM KDD
    • McSherry, F.1    Mironov, I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.