-
2
-
-
84929698969
-
Multiparty computation with faulty majority
-
BEAVER, D., AND GOLDWASSER, S. Multiparty computation with faulty majority. In CRYPTO’89.
-
CRYPTO’89
-
-
Beaver, D.1
Goldwasser, S.2
-
3
-
-
40349089019
-
Perfectly-secure mpc with linear communication complexity
-
Springer-Verlag
-
BEERLIOVÁ-TRUBÍNIOVÁ, Z., AND HIRT, M. Perfectly-secure mpc with linear communication complexity. In TCC2008(2008), Springer-Verlag, pp. 213–230.
-
(2008)
TCC2008
, pp. 213-230
-
-
Beerliová-Trubíniová, Z.1
Hirt, M.2
-
4
-
-
84885006645
-
Distributed private data analysis: Simultaneously solving how and what
-
BEIMEL, A., NISSIMI, K., AND OMRI, E. Distributed private data analysis: Simultaneously solving how and what. In CRYPTO 2008.
-
(2008)
CRYPTO
-
-
Beimel, A.1
Nissimi, K.2
Omri, E.3
-
5
-
-
70349266254
-
Fairplaymp: A system for secure multi-party computation
-
BEN-DAVID, A., NISAN, N., AND PINKAS, B. Fairplaymp: a system for secure multi-party computation. In CCS’08 (2008), ACM, pp. 257–266.
-
(2008)
CCS’08
, pp. 257-266
-
-
Ben-David, A.1
Nisan, N.2
Pinkas, B.3
-
6
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
BEN-OR, M., GOLDWASSER, S., AND WIGDERSON, A. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In STOC’88 (1988), ACM, pp. 1–10.
-
(1988)
STOC’88
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
7
-
-
33244468835
-
Practical privacy: The SuLQ framework
-
ACM Press
-
BLUM, A., DWORK, C., MCSHERRY, F., AND NISSIM, K. Practical privacy: the SuLQ framework. In PODS’05 (2005), ACM Press, pp. 128–138.
-
(2005)
PODS’05
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
8
-
-
85047802462
-
A learning theory approach to non-interactive database privacy
-
BLUM, A., LIGETT, K., AND ROTH, A. A learning theory approach to non-interactive database privacy. In STOC 08.
-
STOC 08
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
9
-
-
84929698970
-
Privacy, accuracy, and consistency too: A holistic solution to contingency table release
-
BOAZ BARAK, E. A. Privacy, accuracy, and consistency too: a holistic solution to contingency table release. In PODS’07.
-
PODS’07
-
-
Boaz Barak, E.A.1
-
10
-
-
85076311436
-
Collaborative filtering with privacy via factor analysis
-
CANNY, J. Collaborative filtering with privacy via factor analysis. In SIGIR’02.
-
SIGIR’02
-
-
Canny, J.1
-
12
-
-
35448959656
-
Algebraic geometric secret sharing schemes and secure multi-party computations over small fields
-
CHEN, H., AND CRAMER, R. Algebraic geometric secret sharing schemes and secure multi-party computations over small fields. In CRYPTO2006.
-
CRYPTO2006
-
-
Chen, H.1
Cramer, R.2
-
13
-
-
85075599381
-
Map-reduce for machine learning on multicore
-
CHU, C.-T., KIM, S. K., LIN, Y.-A., YU, Y., BRADSKI, G., NG, A. Y., AND OLUKOTUN, K. Map-reduce for machine learning on multicore. In NIPS 2006 (2006).
-
(2006)
NIPS 2006
-
-
Chu, C.-T.1
Kim, S.K.2
Lin, Y.-A.3
Yu, Y.4
Bradski, G.5
Ng, A.Y.6
Olukotun, K.7
-
15
-
-
22044443106
-
Zero-knowledge proof for finite field arithmetic, or: Can zero-knowledge be for free?
-
Springer-Verlag
-
CRAMER, R., AND DAMGARD, I. Zero-knowledge proof for finite field arithmetic, or: Can zero-knowledge be for free? In CRYPTO’98 (1998), Springer-Verlag.
-
(1998)
CRYPTO’98
-
-
Cramer, R.1
Damgard, I.2
-
16
-
-
51849125042
-
Scalable multiparty computation with nearly optimal work and resilience
-
Berlin, Heidelberg, Springer-Verlag
-
DAMGÅRD, I., ISHAI, Y., KRØIGAARD, M., NIELSEN, J. B., AND SMITH, A. Scalable multiparty computation with nearly optimal work and resilience. In CRYPTO 2008 (Berlin, Heidelberg, 2008), Springer-Verlag, pp. 241–261.
-
(2008)
CRYPTO 2008
, pp. 241-261
-
-
Damgård, I.1
Ishai, Y.2
Krøigaard, M.3
Nielsen, J.B.4
Smith, A.5
-
17
-
-
35348914807
-
Google news personalization: Scalable online collaborative filtering
-
ACM Press
-
DAS, A. S., DATAR, M., GARG, A., AND RAJARAM, S. Google news personalization: scalable online collaborative filtering. In WWW’07 (2007), ACM Press, pp. 271–280.
-
(2007)
WWW’07
, pp. 271-280
-
-
Das, A.S.1
Datar, M.2
Garg, A.3
Rajaram, S.4
-
19
-
-
1142275486
-
Revealing information while preserving privacy
-
DINUR, I., AND NISSIM, K. Revealing information while preserving privacy. In PODS’03 (2003), pp. 202–210.
-
(2003)
PODS’03
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
20
-
-
85076319409
-
Privacy without noise
-
DUAN, Y. Privacy without noise. In CIKM’09.
-
CIKM’09
-
-
Duan, Y.1
-
21
-
-
52649158733
-
Practical private computation and zero-knowledge tools for privacy-preserving distributed data mining
-
DUAN, Y., AND CANNY, J. Practical private computation and zero-knowledge tools for privacy-preserving distributed data mining. In SDM’08 (2008).
-
(2008)
SDM’08
-
-
Duan, Y.1
Canny, J.2
-
22
-
-
33644750145
-
A secure online algorithm for link analysis on weighted graph
-
DUAN, Y., WANG, J., KAM, M., AND CANNY, J. A secure online algorithm for link analysis on weighted graph. In Proc. of the Workshop on Link Analysis, Counterterrorism and Security, SDM 05, pp. 71–81.
-
Proc. Of the Workshop on Link Analysis, Counterterrorism and Security, SDM 05
, pp. 71-81
-
-
Duan, Y.1
Wang, J.2
Kam, M.3
Canny, J.4
-
23
-
-
70349091568
-
Ask a better question, get a better answer a new approach to private data analysis
-
Springer
-
DWORK, C. Ask a better question, get a better answer a new approach to private data analysis. In ICDT 2007 (2007), Springer, pp. 18–27.
-
(2007)
ICDT 2007
, pp. 18-27
-
-
Dwork, C.1
-
24
-
-
57049085430
-
Our data, ourselves: Privacy via distributed noise generation
-
Springer
-
DWORK, C., KENTHAPADI, K., MCSHERRY, F., MIRONOV, I., AND NAOR, M. Our data, ourselves: Privacy via distributed noise generation. In EUROCRYPT 2006 (2006), Springer.
-
(2006)
EUROCRYPT 2006
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
25
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
Springer
-
DWORK, C., MCSHERRY, F., NISSIM, K., AND SMITH, A. Calibrating noise to sensitivity in private data analysis. In TCC 2006 (2006), Springer, pp. 265–284.
-
(2006)
TCC 2006
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
26
-
-
84941180490
-
Agents’ privacy in distributed algorithmic mechanisms
-
Berkeley, CA, May
-
FEIGENBAUM, J., NISAN, N., RAMACHANDRAN, V., SAMI, R., AND SHENKER, S. Agents’ privacy in distributed algorithmic mechanisms. In Workshop on Economics and Information Securit (Berkeley, CA, May 2002).
-
(2002)
Workshop on Economics and Information Securit
-
-
Feigenbaum, J.1
Nisan, N.2
Ramachandran, V.3
Sami, R.4
Shenker, S.5
-
27
-
-
0000097412
-
How to prove yourself: Practical solutions to identification and signature problems
-
FIAT, A., AND SHAMIR, A. How to prove yourself: Practical solutions to identification and signature problems. In CRYPTO 86.
-
CRYPTO
, vol.86
-
-
Fiat, A.1
Shamir, A.2
-
28
-
-
22844456126
-
General adversaries in unconditional multi-party computation
-
FITZI, M., HIRT, M., AND MAURER, U. General adversaries in unconditional multi-party computation. In ASIACRYPT’ 99.
-
ASIACRYPT’ 99
-
-
Fitzi, M.1
Hirt, M.2
Maurer, U.3
-
29
-
-
0031628398
-
Simplified vss and fast-track multiparty computations with applications to threshold cryptography
-
GENNARO, R., RABIN, M. O., AND RABIN, T. Simplified vss and fast-track multiparty computations with applications to threshold cryptography. In PODC’98, pp. 101–111.
-
PODC’98
, pp. 101-111
-
-
Gennaro, R.1
Rabin, M.O.2
Rabin, T.3
-
32
-
-
0028676264
-
Definitions and properties of zero-knowledge proof systems
-
GOLDREICH, O., AND OREN, Y. Definitions and properties of zero-knowledge proof systems. Journal of Cryptology 7, 1 (1994), 1–32.
-
(1994)
Journal of Cryptology
, vol.7
, Issue.1
, pp. 1-32
-
-
Goldreich, O.1
Oren, Y.2
-
33
-
-
84955564077
-
Fair computation of general functions in presence of immoral majority
-
Springer-Verlag
-
GOLDWASSER, S., AND LEVIN, L. Fair computation of general functions in presence of immoral majority. In CRYPTO’90 (1991), Springer-Verlag, pp. 77–93.
-
(1991)
CRYPTO’90
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.2
-
34
-
-
84952014240
-
Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract)
-
HIRT, M., AND MAURER, U. Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract). In PODC’97.
-
PODC’97
-
-
Hirt, M.1
Maurer, U.2
-
35
-
-
33745999816
-
Player simulation and general adversary structures in perfect multiparty computation
-
HIRT, M., AND MAURER, U. Player simulation and general adversary structures in perfect multiparty computation. Journal of Cryptology 13, 1 (2000), 31–60.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 31-60
-
-
Hirt, M.1
Maurer, U.2
-
36
-
-
0027188175
-
Efficient noise-tolerant learning from statistical queries
-
KEARNS, M. Efficient noise-tolerant learning from statistical queries. In STOC’93 (1993), pp. 392–401.
-
(1993)
STOC’93
, pp. 392-401
-
-
Kearns, M.1
-
37
-
-
0003851780
-
Arpack Users’ guide: Solution of large-scale eigenvalue problems with implicitly restarted Arnoldi methods
-
LEHOUCQ, R. B., SORENSEN, D. C., AND YANG, C. ARPACK Users’ Guide: Solution of Large-Scale Eigenvalue Problems with Implicitly Restarted Arnoldi Methods. SIAM, 1998.
-
(1998)
SIAM
-
-
Lehoucq, R.B.1
Sorensen, D.C.2
Yang, C.3
-
38
-
-
33746437508
-
Privacy preserving data mining
-
LINDELL, Y., AND PINKAS, B. Privacy preserving data mining. Journal of cryptology 15, 3 (2002), 177–206.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
39
-
-
85076284037
-
Implementing two-party computation efficiently with security against malicious adversaries
-
LINDELL, Y., PINKAS, B., AND SMART, N. P. Implementing two-party computation efficiently with security against malicious adversaries. In SCN’08.
-
SCN’08
-
-
Lindell, Y.1
Pinkas, B.2
Smart, N.P.3
-
40
-
-
85084163840
-
Fairplay—a secure two-party computation system
-
Berkeley, CA, USA, USENIX Association
-
MALKHI, D., NISAN, N., PINKAS, B., AND SELLA, Y. Fairplay—a secure two-party computation system. In SSYM’04: Proceedings of the 13th conference on USENIX Security Symposium (Berkeley, CA, USA, 2004), USENIX Association, pp. 20–20.
-
(2004)
SSYM’04: Proceedings of the 13th Conference on USENIX Security Symposium
, pp. 20
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
41
-
-
79960016482
-
Differentially private recommender systems: Building privacy into the netflix prize contenders
-
MCSHERRY, F., AND MIRONOV, I. Differentially private recommender systems: Building privacy into the netflix prize contenders. In KDD’09.
-
KDD’09
-
-
McSherry, F.1
Mironov, I.2
-
42
-
-
84970022147
-
Mechanism design via differential privacy
-
MCSHERRY, F., AND TALWAR, K. Mechanism design via differential privacy. In FOCS’07.
-
FOCS’07
-
-
McSherry, F.1
Talwar, K.2
-
43
-
-
35448955271
-
Smooth sensitivity and sampling in private data analysis
-
NISSIM, K., RASKHODNIKOVA, S., AND SMITH, A. Smooth sensitivity and sampling in private data analysis. In STOC’07 (2007), ACM, pp. 75–84.
-
(2007)
STOC’07
, pp. 75-84
-
-
Nissim, K.1
Raskhodnikova, S.2
Smith, A.3
-
44
-
-
42549094671
-
Trapdooring discrete logarithms on elliptic curves over rings
-
PAILLIER, P. Trapdooring discrete logarithms on elliptic curves over rings. In ASIACRYPT’00.
-
ASIACRYPT’00
-
-
Paillier, P.1
-
45
-
-
0000845043
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
PEDERSEN, T. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO’91.
-
CRYPTO’91
-
-
Pedersen, T.1
-
46
-
-
77956992104
-
Secure two-party computation is practical
-
Report 2009/314
-
PINKAS, B., SCHNEIDER, T., SMART, N., AND WILLIAMS, S. Secure two-party computation is practical. Cryptology ePrint Archive, Report 2009/314, 2009.
-
(2009)
Cryptology ePrint Archive
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.3
Williams, S.4
-
48
-
-
0003424374
-
Numerical linear algebra
-
TREFETHEN, L. N., AND III, D. B. Numerical Linear Algebra. SIAM, 1997.
-
(1997)
SIAM
-
-
Trefethen, L.N.1
-
49
-
-
85076266123
-
Privacy-preserving k-means clustering over vertically partitioned data
-
VAIDYA, J., AND CLIFTON, C. Privacy-preserving k-means clustering over vertically partitioned data. In KDD’03.
-
KDD’03
-
-
Vaidya, J.1
Clifton, C.2
-
50
-
-
12244255356
-
Privacy-preserving Bayesian network structure computation on distributed heterogeneous data
-
WRIGHT, R., AND YANG, Z. Privacy-preserving bayesian network structure computation on distributed heterogeneous data. In KDD’04 (2004), pp. 713–718.
-
(2004)
KDD’04
, pp. 713-718
-
-
Wright, R.1
Yang, Z.2
-
51
-
-
84880121624
-
Privacy-preserving classification of customer data without loss of accuracy
-
YANG, Z., ZHONG, S., AND WRIGHT, R. N. Privacy-preserving classification of customer data without loss of accuracy. In SDM 2005 (2005).
-
(2005)
SDM 2005
-
-
Yang, Z.1
Zhong, S.2
Wright, R.N.3
-
52
-
-
0020312165
-
Protocols for secure computations
-
YAO, A. C.-C. Protocols for secure computations. In FOCS’82 (1982), IEEE, pp. 160–164.
-
(1982)
FOCS’82
, pp. 160-164
-
-
Yao, A.C.-C.1
|