메뉴 건너뛰기




Volumn , Issue , 2013, Pages 801-812

Privacy-preserving matrix factorization

Author keywords

garbled circuits; matrix factorization; multi party computation; privacy; recommender systems

Indexed keywords

COMMODITY HARDWARE; CRYPTOGRAPHIC TECHNIQUES; EFFICIENT IMPLEMENTATION; GARBLED CIRCUITS; MATRIX FACTORIZATIONS; MULTIPARTY COMPUTATION; OBLIVIOUS SORTING; PRIVACY PRESERVING;

EID: 84888987660     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2508859.2516751     Document Type: Conference Paper
Times cited : (283)

References (63)
  • 1
    • 53449102514 scopus 로고    scopus 로고
    • ALAMBIC: A privacy-preserving recommender system for electronic commerce
    • E. Aïmeur, G. Brassard, J. M. Fernandez, and F. S. M. Onana. ALAMBIC: A privacy-preserving recommender system for electronic commerce. Int. J. Inf. Sec., 7(5), 2008.
    • (2008) Int. J. Inf. Sec. , vol.7 , Issue.5
    • Aïmeur, E.1    Brassard, G.2    Fernandez, J.M.3    Onana, F.S.M.4
  • 4
    • 0141911095 scopus 로고
    • Non-interactive oblivious transfer and applications
    • M. Bellare and S. Micali. Non-interactive oblivious transfer and applications. In CRYPTO, 1990.
    • (1990) CRYPTO
    • Bellare, M.1    Micali, S.2
  • 6
    • 84889068201 scopus 로고    scopus 로고
    • Collaborative filtering with privacy
    • J. F. Canny. Collaborative filtering with privacy. In IEEE S&P, 2002.
    • (2002) IEEE S&P
    • Canny, J.F.1
  • 7
  • 10
    • 84883319687 scopus 로고    scopus 로고
    • Trading sugar beet quotas - secure multiparty computation in practice
    • I. Damgård and T. Toft. Trading sugar beet quotas - secure multiparty computation in practice. ERCIM News, 2008.
    • (2008) ERCIM News
    • Damgård, I.1    Toft, T.2
  • 11
    • 0242496951 scopus 로고    scopus 로고
    • Secure multi-party computation problems and their applications: A review and open problems
    • W. Du and M. J. Atallah. Secure multi-party computation problems and their applications: A review and open problems. In New Security Paradigms Workshop, 2001.
    • New Security Paradigms Workshop, 2001
    • Du, W.1    Atallah, M.J.2
  • 12
    • 50249086141 scopus 로고    scopus 로고
    • Differential privacy
    • C. Dwork. Differential privacy. In ICALP, 2006.
    • (2006) ICALP
    • Dwork, C.1
  • 13
    • 84889052942 scopus 로고    scopus 로고
    • Privacy-preserving data-oblivious geometric algorithms for geographic data
    • D. Eppstein, M. T. Goodrich, and R. Tamassia. Privacy-preserving data-oblivious geometric algorithms for geographic data. In 18th SIGSPATIAL, 2010.
    • (2010) 18th SIGSPATIAL
    • Eppstein, D.1    Goodrich, M.T.2    Tamassia, R.3
  • 14
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Commun. ACM, 28(6), 1985.
    • (1985) Commun. ACM , vol.28 , Issue.6
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 16
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • C. Gentry. Fully homomorphic encryption using ideal lattices. In STOC, 2009.
    • (2009) STOC
    • Gentry, C.1
  • 18
    • 77951692170 scopus 로고    scopus 로고
    • Randomized shellsort: A simple oblivious sorting algorithm
    • M. T. Goodrich. Randomized shellsort: A simple oblivious sorting algorithm. In SODA, 2010.
    • (2010) SODA
    • Goodrich, M.T.1
  • 19
    • 79959681766 scopus 로고    scopus 로고
    • Data-oblivious external-memory algorithms for the compaction, selection, and sorting of outsourced data
    • M. T. Goodrich. Data-oblivious external-memory algorithms for the compaction, selection, and sorting of outsourced data. In SPAA, 2011.
    • (2011) SPAA
    • Goodrich, M.T.1
  • 20
    • 84881251369 scopus 로고    scopus 로고
    • ML confidential: Machine learning on encrypted data
    • Report 2012/323
    • T. Graepel, K. Lauter, and M. Naehrig. ML confidential: Machine learning on encrypted data. Cryptology ePrint Archive, Report 2012/323, 2012.
    • (2012) Cryptology ePrint Archive
    • Graepel, T.1    Lauter, K.2    Naehrig, M.3
  • 21
    • 80955145180 scopus 로고    scopus 로고
    • Secure multiple linear regression based on homomorphic encryption
    • R. Hall, S. E. Fienberg, and Y. Nardi. Secure multiple linear regression based on homomorphic encryption. J. Official Statistics, 2011.
    • (2011) J. Official Statistics
    • Hall, R.1    Fienberg, S.E.2    Nardi, Y.3
  • 22
    • 84889004576 scopus 로고    scopus 로고
    • Practically efficient multi-party sorting protocols from comparison sort algorithms
    • K. Hamada, R. Kikuchi, D. Ikarashi, K. Chida, and K. Takahashi. Practically efficient multi-party sorting protocols from comparison sort algorithms. In ICISC, 2013.
    • (2013) ICISC
    • Hamada, K.1    Kikuchi, R.2    Ikarashi, D.3    Chida, K.4    Takahashi, K.5
  • 24
    • 84914127581 scopus 로고    scopus 로고
    • Faster secure two-party computation using garbled circuits
    • Y. Huang, D. Evans, J. Katz, and L. Malka. Faster secure two-party computation using garbled circuits. In USENIX Security, 2011.
    • (2011) USENIX Security
    • Huang, Y.1    Evans, D.2    Katz, J.3    Malka, L.4
  • 25
    • 84889064808 scopus 로고    scopus 로고
    • Quid-pro-quo-tocols: Strengthening semi-honest protocols with dual execution
    • Y. Huang, J. Katz, and D. Evans. Quid-pro-quo-tocols: Strengthening semi-honest protocols with dual execution. In IEEE S&P, 2012.
    • (2012) IEEE S&P
    • Huang, Y.1    Katz, J.2    Evans, D.3
  • 26
    • 84923318201 scopus 로고    scopus 로고
    • Efficient privacy-preserving biometric identification
    • Y. Huang, L. Malka, D. Evans, and J. Katz. Efficient privacy-preserving biometric identification. In NDSS, 2011.
    • (2011) NDSS
    • Huang, Y.1    Malka, L.2    Evans, D.3    Katz, J.4
  • 30
    • 77349092141 scopus 로고    scopus 로고
    • Privacy-preserving analysis of vertically partitioned data using secure matrix products
    • A. F. Karr, X. Lin, A. P. Sanil, and J. P. Reiter. Privacy-preserving analysis of vertically partitioned data using secure matrix products. J. Official Statistics, 2009.
    • (2009) J. Official Statistics
    • Karr, A.F.1    Lin, X.2    Sanil, A.P.3    Reiter, J.P.4
  • 31
    • 64549091526 scopus 로고    scopus 로고
    • Learning low rank matrices from O (n) entries
    • R. H. Keshavan, A. Montanari, and S. Oh. Learning low rank matrices from O (n) entries. In Allerton, 2008.
    • (2008) Allerton
    • Keshavan, R.H.1    Montanari, A.2    Oh, S.3
  • 32
    • 0000811402 scopus 로고    scopus 로고
    • Sorting and Searching
    • Addison-Wesley, 2nd edition
    • D. E. Knuth. The Art Of Computer Programming - Volume 3 / Sorting and Searching. Addison-Wesley, 2nd edition, 1998.
    • (1998) The Art of Computer Programming , vol.3
    • Knuth, D.E.1
  • 33
    • 84869443834 scopus 로고    scopus 로고
    • Improved garbled circuit building blocks and applications to auctions and computing minima
    • V. Kolesnikov, A.-R. Sadeghi, and T. Schneider. Improved garbled circuit building blocks and applications to auctions and computing minima. In CANS, 2009.
    • (2009) CANS
    • Kolesnikov, V.1    Sadeghi, A.-R.2    Schneider, T.3
  • 34
    • 78149254461 scopus 로고    scopus 로고
    • Improved garbled circuit: Free XOR gates and applications
    • V. Kolesnikov and T. Schneider. Improved garbled circuit: Free XOR gates and applications. In ICALP, 2008.
    • (2008) ICALP
    • Kolesnikov, V.1    Schneider, T.2
  • 35
    • 85008044987 scopus 로고    scopus 로고
    • Matrix factorization techniques for recommender systems
    • Y. Koren, R. M. Bell, and C. Volinsky. Matrix factorization techniques for recommender systems. IEEE Computer, 2009.
    • (2009) IEEE Computer
    • Koren, Y.1    Bell, R.M.2    Volinsky, C.3
  • 36
    • 84889076745 scopus 로고    scopus 로고
    • Billion-gate secure computation with malicious adversaries
    • B. Kreuter, A. Shelat, and C.-H. Shen. Billion-gate secure computation with malicious adversaries. In USENIX Security, 2012.
    • (2012) USENIX Security
    • Kreuter, B.1    Shelat, A.2    Shen, C.-H.3
  • 37
    • 38849180269 scopus 로고    scopus 로고
    • Do you trust your recommendations? An exploration of security and privacy issues in recommender systems
    • S. K. Lam, D. Frankowski, and J. Riedl. Do you trust your recommendations? An exploration of security and privacy issues in recommender systems. In ETRICS 2006, 2006.
    • (2006) ETRICS 2006
    • Lam, S.K.1    Frankowski, D.2    Riedl, J.3
  • 38
    • 19944368437 scopus 로고    scopus 로고
    • Shilling recommender systems for fun and profit
    • S. K. Lam and J. Riedl. Shilling recommender systems for fun and profit. In WWW, 2004.
    • (2004) WWW
    • Lam, S.K.1    Riedl, J.2
  • 40
    • 84893321220 scopus 로고    scopus 로고
    • Fast cut-and-choose based protocols for malicious and covert adversaries
    • Y. Lindell. Fast cut-and-choose based protocols for malicious and covert adversaries. IACR Cryptology ePrint Archive, 2013.
    • (2013) IACR Cryptology ePrint Archive
    • Lindell, Y.1
  • 42
    • 64249101946 scopus 로고    scopus 로고
    • A proof of security of Yao's protocol for two-party computation
    • Y. Lindell and B. Pinkas. A proof of security of Yao's protocol for two-party computation. J. Cryptology, 2009.
    • (2009) J. Cryptology
    • Lindell, Y.1    Pinkas, B.2
  • 43
    • 84869506354 scopus 로고    scopus 로고
    • Secure two-party computation via cut-and-choose oblivious transfer
    • Y. Lindell and B. Pinkas. Secure two-party computation via cut-and-choose oblivious transfer. J. Cryptology, 2012.
    • (2012) J. Cryptology
    • Lindell, Y.1    Pinkas, B.2
  • 44
    • 52149120767 scopus 로고    scopus 로고
    • Implementing two-party computation efficiently with security against malicious adversaries
    • Y. Lindell, B. Pinkas, and N. P. Smart. Implementing two-party computation efficiently with security against malicious adversaries. In SCN, 2008.
    • (2008) SCN
    • Lindell, Y.1    Pinkas, B.2    Smart, N.P.3
  • 46
    • 70350678967 scopus 로고    scopus 로고
    • Differentially private recommender systems: Building privacy into the Netflix prize contenders
    • F. McSherry and I. Mironov. Differentially private recommender systems: Building privacy into the Netflix prize contenders. In KDD, 2009.
    • (2009) KDD
    • McSherry, F.1    Mironov, I.2
  • 47
    • 35348969366 scopus 로고    scopus 로고
    • Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness
    • B. Mobasher, R. Burke, R. Bhaumik, and C. Williams. Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness. ACM Trans. Internet Techn., 7(4), 2007.
    • (2007) ACM Trans. Internet Techn. , vol.7 , Issue.4
    • Mobasher, B.1    Burke, R.2    Bhaumik, R.3    Williams, C.4
  • 49
    • 84876190311 scopus 로고    scopus 로고
    • Robust de-anonymization of large sparse datasets
    • A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets. In IEEE S&P, 2008.
    • (2008) IEEE S&P
    • Narayanan, A.1    Shmatikov, V.2
  • 51
    • 84889020434 scopus 로고    scopus 로고
    • Communication efficient secure linear algebra
    • K. Nissim and E. Weinreb. Communication efficient secure linear algebra. In TCC, 2006.
    • (2006) TCC
    • Nissim, K.1    Weinreb, E.2
  • 52
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT, 1999.
    • (1999) EUROCRYPT
    • Paillier, P.1
  • 54
    • 0018456413 scopus 로고
    • Relations among complexity measures
    • N. Pippenger and M. J. Fischer. Relations among complexity measures. J. ACM, 26(2), 1979.
    • (1979) J. ACM , vol.26 , Issue.2
    • Pippenger, N.1    Fischer, M.J.2
  • 55
    • 0003462641 scopus 로고
    • Technical Report TR-81, Aiken Computation Laboratory, Harvard University
    • M. O. Rabin. How to exchange secrets by oblivious transfer. Technical Report TR-81, Aiken Computation Laboratory, Harvard University, 1981.
    • (1981) How to Exchange Secrets by Oblivious Transfer
    • Rabin, M.O.1
  • 56
    • 70349309809 scopus 로고    scopus 로고
    • On lattices, learning with errors, random linear codes, and cryptography
    • O. Regev. On lattices, learning with errors, random linear codes, and cryptography. J. ACM, 56(6), 2009.
    • (2009) J. ACM , vol.56 , Issue.6
    • Regev, O.1
  • 59
    • 0005044302 scopus 로고    scopus 로고
    • On the security of ElGamal based encryption
    • Y. Tsiounis and M. Yung. On the security of ElGamal based encryption. In PKC, 1998.
    • (1998) PKC
    • Tsiounis, Y.1    Yung, M.2
  • 60
    • 77954519783 scopus 로고    scopus 로고
    • Bureaucratic protocols for secure two-party sorting, selection, and permuting
    • G. Wang, T. Luo, M. T. Goodrich, W. Du, and Z. Zhu. Bureaucratic protocols for secure two-party sorting, selection, and permuting. In CCS, 2010.
    • (2010) CCS
    • Wang, G.1    Luo, T.2    Goodrich, M.T.3    Du, W.4    Zhu, Z.5
  • 61
    • 84867394997 scopus 로고    scopus 로고
    • Inferring and obfuscating user gender based on ratings
    • BlurMe
    • U. Weinsberg, S. Bhagat, S. Ioannidis, and N. Taft. BlurMe: Inferring and obfuscating user gender based on ratings. In RecSys, 2012.
    • (2012) RecSys
    • Weinsberg, U.1    Bhagat, S.2    Ioannidis, S.3    Taft, N.4
  • 62
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • A. C.-C. Yao. Protocols for secure computations. In FOCS, 1982.
    • (1982) FOCS
    • Yao, A.C.-C.1
  • 63
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. C.-C. Yao. How to generate and exchange secrets. In FOCS, 1986.
    • (1986) FOCS
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.