메뉴 건너뛰기




Volumn , Issue , 2010, Pages 207-221

P4P: Practical large-scale privacy-preserving distributed computation robust against malicious users

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; DATA MINING; K-MEANS CLUSTERING; LEARNING ALGORITHMS; MACHINE LEARNING;

EID: 84883298285     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (47)

References (52)
  • 2
    • 84929698969 scopus 로고    scopus 로고
    • Multiparty computation with faulty majority
    • BEAVER, D., AND GOLDWASSER, S. Multiparty computation with faulty majority. In CRYPTO’89.
    • CRYPTO’89
    • Beaver, D.1    Goldwasser, S.2
  • 3
    • 40349089019 scopus 로고    scopus 로고
    • Perfectly-secure mpc with linear communication complexity
    • Springer-Verlag
    • BEERLIOVÁ-TRUBÍNIOVÁ, Z., AND HIRT, M. Perfectly-secure mpc with linear communication complexity. In TCC2008(2008), Springer-Verlag, pp. 213–230.
    • (2008) TCC2008 , pp. 213-230
    • Beerliová-Trubíniová, Z.1    Hirt, M.2
  • 4
    • 84885006645 scopus 로고    scopus 로고
    • Distributed private data analysis: Simultaneously solving how and what
    • BEIMEL, A., NISSIMI, K., AND OMRI, E. Distributed private data analysis: Simultaneously solving how and what. In CRYPTO 2008.
    • (2008) CRYPTO
    • Beimel, A.1    Nissimi, K.2    Omri, E.3
  • 5
    • 70349266254 scopus 로고    scopus 로고
    • Fairplaymp: A system for secure multi-party computation
    • BEN-DAVID, A., NISAN, N., AND PINKAS, B. Fairplaymp: a system for secure multi-party computation. In CCS’08 (2008), ACM, pp. 257–266.
    • (2008) CCS’08 , pp. 257-266
    • Ben-David, A.1    Nisan, N.2    Pinkas, B.3
  • 6
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • BEN-OR, M., GOLDWASSER, S., AND WIGDERSON, A. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In STOC’88 (1988), ACM, pp. 1–10.
    • (1988) STOC’88 , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 7
    • 33244468835 scopus 로고    scopus 로고
    • Practical privacy: The SuLQ framework
    • ACM Press
    • BLUM, A., DWORK, C., MCSHERRY, F., AND NISSIM, K. Practical privacy: the SuLQ framework. In PODS’05 (2005), ACM Press, pp. 128–138.
    • (2005) PODS’05 , pp. 128-138
    • Blum, A.1    Dwork, C.2    McSherry, F.3    Nissim, K.4
  • 8
    • 85047802462 scopus 로고    scopus 로고
    • A learning theory approach to non-interactive database privacy
    • BLUM, A., LIGETT, K., AND ROTH, A. A learning theory approach to non-interactive database privacy. In STOC 08.
    • STOC 08
    • Blum, A.1    Ligett, K.2    Roth, A.3
  • 9
    • 84929698970 scopus 로고    scopus 로고
    • Privacy, accuracy, and consistency too: A holistic solution to contingency table release
    • BOAZ BARAK, E. A. Privacy, accuracy, and consistency too: a holistic solution to contingency table release. In PODS’07.
    • PODS’07
    • Boaz Barak, E.A.1
  • 10
    • 85076311436 scopus 로고    scopus 로고
    • Collaborative filtering with privacy via factor analysis
    • CANNY, J. Collaborative filtering with privacy via factor analysis. In SIGIR’02.
    • SIGIR’02
    • Canny, J.1
  • 12
    • 35448959656 scopus 로고    scopus 로고
    • Algebraic geometric secret sharing schemes and secure multi-party computations over small fields
    • CHEN, H., AND CRAMER, R. Algebraic geometric secret sharing schemes and secure multi-party computations over small fields. In CRYPTO2006.
    • CRYPTO2006
    • Chen, H.1    Cramer, R.2
  • 15
    • 22044443106 scopus 로고    scopus 로고
    • Zero-knowledge proof for finite field arithmetic, or: Can zero-knowledge be for free?
    • Springer-Verlag
    • CRAMER, R., AND DAMGARD, I. Zero-knowledge proof for finite field arithmetic, or: Can zero-knowledge be for free? In CRYPTO’98 (1998), Springer-Verlag.
    • (1998) CRYPTO’98
    • Cramer, R.1    Damgard, I.2
  • 16
    • 51849125042 scopus 로고    scopus 로고
    • Scalable multiparty computation with nearly optimal work and resilience
    • Berlin, Heidelberg, Springer-Verlag
    • DAMGÅRD, I., ISHAI, Y., KRØIGAARD, M., NIELSEN, J. B., AND SMITH, A. Scalable multiparty computation with nearly optimal work and resilience. In CRYPTO 2008 (Berlin, Heidelberg, 2008), Springer-Verlag, pp. 241–261.
    • (2008) CRYPTO 2008 , pp. 241-261
    • Damgård, I.1    Ishai, Y.2    Krøigaard, M.3    Nielsen, J.B.4    Smith, A.5
  • 17
    • 35348914807 scopus 로고    scopus 로고
    • Google news personalization: Scalable online collaborative filtering
    • ACM Press
    • DAS, A. S., DATAR, M., GARG, A., AND RAJARAM, S. Google news personalization: scalable online collaborative filtering. In WWW’07 (2007), ACM Press, pp. 271–280.
    • (2007) WWW’07 , pp. 271-280
    • Das, A.S.1    Datar, M.2    Garg, A.3    Rajaram, S.4
  • 19
    • 1142275486 scopus 로고    scopus 로고
    • Revealing information while preserving privacy
    • DINUR, I., AND NISSIM, K. Revealing information while preserving privacy. In PODS’03 (2003), pp. 202–210.
    • (2003) PODS’03 , pp. 202-210
    • Dinur, I.1    Nissim, K.2
  • 20
    • 85076319409 scopus 로고    scopus 로고
    • Privacy without noise
    • DUAN, Y. Privacy without noise. In CIKM’09.
    • CIKM’09
    • Duan, Y.1
  • 21
    • 52649158733 scopus 로고    scopus 로고
    • Practical private computation and zero-knowledge tools for privacy-preserving distributed data mining
    • DUAN, Y., AND CANNY, J. Practical private computation and zero-knowledge tools for privacy-preserving distributed data mining. In SDM’08 (2008).
    • (2008) SDM’08
    • Duan, Y.1    Canny, J.2
  • 23
    • 70349091568 scopus 로고    scopus 로고
    • Ask a better question, get a better answer a new approach to private data analysis
    • Springer
    • DWORK, C. Ask a better question, get a better answer a new approach to private data analysis. In ICDT 2007 (2007), Springer, pp. 18–27.
    • (2007) ICDT 2007 , pp. 18-27
    • Dwork, C.1
  • 25
    • 33745556605 scopus 로고    scopus 로고
    • Calibrating noise to sensitivity in private data analysis
    • Springer
    • DWORK, C., MCSHERRY, F., NISSIM, K., AND SMITH, A. Calibrating noise to sensitivity in private data analysis. In TCC 2006 (2006), Springer, pp. 265–284.
    • (2006) TCC 2006 , pp. 265-284
    • Dwork, C.1    McSherry, F.2    Nissim, K.3    Smith, A.4
  • 27
    • 0000097412 scopus 로고    scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • FIAT, A., AND SHAMIR, A. How to prove yourself: Practical solutions to identification and signature problems. In CRYPTO 86.
    • CRYPTO , vol.86
    • Fiat, A.1    Shamir, A.2
  • 28
    • 22844456126 scopus 로고    scopus 로고
    • General adversaries in unconditional multi-party computation
    • FITZI, M., HIRT, M., AND MAURER, U. General adversaries in unconditional multi-party computation. In ASIACRYPT’ 99.
    • ASIACRYPT’ 99
    • Fitzi, M.1    Hirt, M.2    Maurer, U.3
  • 29
    • 0031628398 scopus 로고    scopus 로고
    • Simplified vss and fast-track multiparty computations with applications to threshold cryptography
    • GENNARO, R., RABIN, M. O., AND RABIN, T. Simplified vss and fast-track multiparty computations with applications to threshold cryptography. In PODC’98, pp. 101–111.
    • PODC’98 , pp. 101-111
    • Gennaro, R.1    Rabin, M.O.2    Rabin, T.3
  • 32
    • 0028676264 scopus 로고
    • Definitions and properties of zero-knowledge proof systems
    • GOLDREICH, O., AND OREN, Y. Definitions and properties of zero-knowledge proof systems. Journal of Cryptology 7, 1 (1994), 1–32.
    • (1994) Journal of Cryptology , vol.7 , Issue.1 , pp. 1-32
    • Goldreich, O.1    Oren, Y.2
  • 33
    • 84955564077 scopus 로고
    • Fair computation of general functions in presence of immoral majority
    • Springer-Verlag
    • GOLDWASSER, S., AND LEVIN, L. Fair computation of general functions in presence of immoral majority. In CRYPTO’90 (1991), Springer-Verlag, pp. 77–93.
    • (1991) CRYPTO’90 , pp. 77-93
    • Goldwasser, S.1    Levin, L.2
  • 34
    • 84952014240 scopus 로고    scopus 로고
    • Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract)
    • HIRT, M., AND MAURER, U. Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract). In PODC’97.
    • PODC’97
    • Hirt, M.1    Maurer, U.2
  • 35
    • 33745999816 scopus 로고    scopus 로고
    • Player simulation and general adversary structures in perfect multiparty computation
    • HIRT, M., AND MAURER, U. Player simulation and general adversary structures in perfect multiparty computation. Journal of Cryptology 13, 1 (2000), 31–60.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 31-60
    • Hirt, M.1    Maurer, U.2
  • 36
    • 0027188175 scopus 로고
    • Efficient noise-tolerant learning from statistical queries
    • KEARNS, M. Efficient noise-tolerant learning from statistical queries. In STOC’93 (1993), pp. 392–401.
    • (1993) STOC’93 , pp. 392-401
    • Kearns, M.1
  • 37
    • 0003851780 scopus 로고    scopus 로고
    • Arpack Users’ guide: Solution of large-scale eigenvalue problems with implicitly restarted Arnoldi methods
    • LEHOUCQ, R. B., SORENSEN, D. C., AND YANG, C. ARPACK Users’ Guide: Solution of Large-Scale Eigenvalue Problems with Implicitly Restarted Arnoldi Methods. SIAM, 1998.
    • (1998) SIAM
    • Lehoucq, R.B.1    Sorensen, D.C.2    Yang, C.3
  • 38
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • LINDELL, Y., AND PINKAS, B. Privacy preserving data mining. Journal of cryptology 15, 3 (2002), 177–206.
    • (2002) Journal of Cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 39
    • 85076284037 scopus 로고    scopus 로고
    • Implementing two-party computation efficiently with security against malicious adversaries
    • LINDELL, Y., PINKAS, B., AND SMART, N. P. Implementing two-party computation efficiently with security against malicious adversaries. In SCN’08.
    • SCN’08
    • Lindell, Y.1    Pinkas, B.2    Smart, N.P.3
  • 41
    • 79960016482 scopus 로고    scopus 로고
    • Differentially private recommender systems: Building privacy into the netflix prize contenders
    • MCSHERRY, F., AND MIRONOV, I. Differentially private recommender systems: Building privacy into the netflix prize contenders. In KDD’09.
    • KDD’09
    • McSherry, F.1    Mironov, I.2
  • 42
    • 84970022147 scopus 로고    scopus 로고
    • Mechanism design via differential privacy
    • MCSHERRY, F., AND TALWAR, K. Mechanism design via differential privacy. In FOCS’07.
    • FOCS’07
    • McSherry, F.1    Talwar, K.2
  • 43
    • 35448955271 scopus 로고    scopus 로고
    • Smooth sensitivity and sampling in private data analysis
    • NISSIM, K., RASKHODNIKOVA, S., AND SMITH, A. Smooth sensitivity and sampling in private data analysis. In STOC’07 (2007), ACM, pp. 75–84.
    • (2007) STOC’07 , pp. 75-84
    • Nissim, K.1    Raskhodnikova, S.2    Smith, A.3
  • 44
    • 42549094671 scopus 로고    scopus 로고
    • Trapdooring discrete logarithms on elliptic curves over rings
    • PAILLIER, P. Trapdooring discrete logarithms on elliptic curves over rings. In ASIACRYPT’00.
    • ASIACRYPT’00
    • Paillier, P.1
  • 45
    • 0000845043 scopus 로고    scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • PEDERSEN, T. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO’91.
    • CRYPTO’91
    • Pedersen, T.1
  • 48
    • 0003424374 scopus 로고    scopus 로고
    • Numerical linear algebra
    • TREFETHEN, L. N., AND III, D. B. Numerical Linear Algebra. SIAM, 1997.
    • (1997) SIAM
    • Trefethen, L.N.1
  • 49
    • 85076266123 scopus 로고    scopus 로고
    • Privacy-preserving k-means clustering over vertically partitioned data
    • VAIDYA, J., AND CLIFTON, C. Privacy-preserving k-means clustering over vertically partitioned data. In KDD’03.
    • KDD’03
    • Vaidya, J.1    Clifton, C.2
  • 50
    • 12244255356 scopus 로고    scopus 로고
    • Privacy-preserving Bayesian network structure computation on distributed heterogeneous data
    • WRIGHT, R., AND YANG, Z. Privacy-preserving bayesian network structure computation on distributed heterogeneous data. In KDD’04 (2004), pp. 713–718.
    • (2004) KDD’04 , pp. 713-718
    • Wright, R.1    Yang, Z.2
  • 51
    • 84880121624 scopus 로고    scopus 로고
    • Privacy-preserving classification of customer data without loss of accuracy
    • YANG, Z., ZHONG, S., AND WRIGHT, R. N. Privacy-preserving classification of customer data without loss of accuracy. In SDM 2005 (2005).
    • (2005) SDM 2005
    • Yang, Z.1    Zhong, S.2    Wright, R.N.3
  • 52
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • YAO, A. C.-C. Protocols for secure computations. In FOCS’82 (1982), IEEE, pp. 160–164.
    • (1982) FOCS’82 , pp. 160-164
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.