메뉴 건너뛰기




Volumn 22, Issue 3, 2014, Pages 355-381

EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity

Author keywords

privacy enhancing technologies; privacy preserving protocols; Secure computation

Indexed keywords

BIOMETRICS; CRYPTOGRAPHY;

EID: 84901848656     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-130482     Document Type: Article
Times cited : (30)

References (58)
  • 2
    • 84873963079 scopus 로고    scopus 로고
    • Secret handshakes with dynamic and fuzzy matching
    • G. Ateniese, M. Blanton and J. Kirsch, Secret handshakes with dynamic and fuzzy matching, in: NDSS, 2007.
    • (2007) NDSS
    • Ateniese, G.1    Blanton, M.2    Kirsch, J.3
  • 3
    • 84871964242 scopus 로고    scopus 로고
    • (If) size matters: Size-hiding private set intersection
    • G. Ateniese, E. De Cristofaro and G. Tsudik, (If) size matters: size-hiding private set intersection, in: PKC, 2011.
    • (2011) PKC
    • Ateniese, G.1    De Cristofaro, E.2    Tsudik, G.3
  • 5
    • 80755143980 scopus 로고    scopus 로고
    • Countering gattaca: Efficient and secure testing of fully-sequenced human genomes
    • P. Baldi, R. Baronio, E. De Cristofaro, P. Gasti and G. Tsudik, Countering gattaca: efficient and secure testing of fully-sequenced human genomes, in: CCS, 2011.
    • (2011) CCS
    • Baldi, P.1    Baronio, R.2    De Cristofaro, E.3    Gasti, P.4    Tsudik, G.5
  • 7
    • 84866779632 scopus 로고    scopus 로고
    • Secure and efficient protocols for iris and fingerprint identification
    • M. Blanton and P. Gasti, Secure and efficient protocols for iris and fingerprint identification, in: ESORICS, 2011.
    • (2011) ESORICS
    • Blanton, M.1    Gasti, P.2
  • 11
    • 74049103179 scopus 로고    scopus 로고
    • Secure two-party k-means clustering
    • P. Bunn and R. Ostrovsky, Secure two-party k-means clustering, in: CCS, 2007.
    • (2007) CCS
    • Bunn, P.1    Ostrovsky, R.2
  • 12
    • 0000182415 scopus 로고
    • A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations
    • H. Chernoff, A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations, The Annals of Mathematical Statistics 23(4) (1952), 493-507.
    • (1952) The Annals of Mathematical Statistics , vol.23 , Issue.4 , pp. 493-507
    • Chernoff, H.1
  • 15
    • 84901829569 scopus 로고    scopus 로고
    • Cornell Univ., KDDCUP Dataset available at
    • Cornell Univ., KDDCUP Dataset, available at: http://www.cs.cornell.edu/ projects/kddcup/datasets. html.
  • 16
    • 84945896337 scopus 로고    scopus 로고
    • Genodroid: Are privacy-preserving genomic tests ready for prime time?
    • E.D. Cristofaro, S. Faber, P. Gasti and G. Tsudik, Genodroid: are privacy-preserving genomic tests ready for prime time?, in: WPES, 2012.
    • (2012) WPES
    • Cristofaro, E.D.1    Faber, S.2    Gasti, P.3    Tsudik, G.4
  • 17
    • 84893240286 scopus 로고    scopus 로고
    • Fast and private computation of cardinality of set intersection and union
    • E. De Cristofaro, P. Gasti and G. Tsudik, Fast and private computation of cardinality of set intersection and union, in: CANS, 2012.
    • (2012) CANS
    • De Cristofaro, E.1    Gasti, P.2    Tsudik, G.3
  • 18
    • 84901838016 scopus 로고    scopus 로고
    • U.S. Department of Homeland Security, available at:
    • U.S. Department of Homeland Security, available at: http://www.dhs.gov/ files/programs/usv.shtm.
  • 19
    • 0034130242 scopus 로고    scopus 로고
    • Use of repetitive DNA sequences and the PCR to differentiate Escherichia coli isolates from human and animal sources
    • P. Dombek, L. Johnson, S. Zimmerley and M. Sadowsky, Use of repetitive DNA sequences and the PCR to differentiate Escherichia coli isolates from human and animal sources, Applied and Environmental Microbiology 66(6) (2000), 2572-2577.
    • (2000) Applied and Environmental Microbiology , vol.66 , Issue.6 , pp. 2572-2577
    • Dombek, P.1    Johnson, L.2    Zimmerley, S.3    Sadowsky, M.4
  • 22
    • 12244263240 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • M. Freedman, K. Nissim and B. Pinkas, Efficient private matching and set intersection, in: EUROCRYPT, 2004.
    • (2004) EUROCRYPT
    • Freedman, M.1    Nissim, K.2    Pinkas, B.3
  • 24
    • 84901846134 scopus 로고    scopus 로고
    • IrisGuard Press Release available at
    • IrisGuard Press Release, available at: http://cl.ly/3KIB.
  • 27
    • 0030214261 scopus 로고    scopus 로고
    • Image retrieval using color and shape
    • A.K. Jain and A. Vailaya, Image retrieval using color and shape, Pattern Recognition 29(8) (1996), 1223-1244.
    • (1996) Pattern Recognition , vol.29 , Issue.8 , pp. 1223-1244
    • Jain, A.K.1    Vailaya, A.2
  • 28
    • 52649171325 scopus 로고    scopus 로고
    • Similar document detection with limited information disclosure
    • W. Jiang, M. Murugesan, C. Clifton and L. Si, Similar document detection with limited information disclosure, in: ICDE, 2008.
    • (2008) ICDE
    • Jiang, W.1    Murugesan, M.2    Clifton, C.3    Si, L.4
  • 30
    • 84862931542 scopus 로고    scopus 로고
    • An efficient approximate protocol for privacy-preserving association rule mining
    • M. Kantarcioglu, R. Nix and J. Vaidya, An efficient approximate protocol for privacy-preserving association rule mining, in: KDD, 2009.
    • (2009) KDD
    • Kantarcioglu, M.1    Nix, R.2    Vaidya, J.3
  • 32
    • 84871965745 scopus 로고    scopus 로고
    • Outsourced private set intersection using homomorphic encryption
    • F. Kerschbaum, Outsourced private set intersection using homomorphic encryption, in: AsiaCCS, 2012.
    • (2012) AsiaCCS
    • Kerschbaum, F.1
  • 33
    • 38049094878 scopus 로고    scopus 로고
    • Privacy-preserving set operations
    • L. Kissner and D. Song, Privacy-preserving set operations, in: CRYPTO, 2005.
    • (2005) CRYPTO
    • Kissner, L.1    Song, D.2
  • 34
    • 79960878565 scopus 로고    scopus 로고
    • Findu: Privacy-preserving personal profile matching in mobile social networks
    • M. Li, N. Cao, S. Yu and W. Lou, Findu: Privacy-preserving personal profile matching in mobile social networks, in: INFOCOM, 2011.
    • (2011) INFOCOM
    • Li, M.1    Cao, N.2    Yu, S.3    Lou, W.4
  • 35
    • 27544470145 scopus 로고    scopus 로고
    • Verifiable homomorphic oblivious transfer and private equality test
    • H. Lipmaa, Verifiable homomorphic oblivious transfer and private equality test, in: ASIACRYPT, 2003.
    • (2003) ASIACRYPT
    • Lipmaa, H.1
  • 37
    • 70349216521 scopus 로고    scopus 로고
    • Secure image retrieval through feature protection
    • W. Lu, A.L. Varna, A. Swaminathan and M. Wu, Secure image retrieval through feature protection, in: ICASSP, 2009.
    • (2009) ICASSP
    • Lu, W.1    Varna, A.L.2    Swaminathan, A.3    Wu, M.4
  • 38
    • 0029701336 scopus 로고    scopus 로고
    • Texture features and learning similarity
    • W.-Y. Ma and B.S. Manjunath, Texture features and learning similarity, in: CVPR, 1996.
    • (1996) CVPR
    • Ma, W.-Y.1    Manjunath, B.S.2
  • 39
    • 85043988965 scopus 로고
    • Finding similar files in a large file system
    • U. Manber, Finding similar files in a large file system, in: USENIX, 1994.
    • (1994) USENIX
    • Manber, U.1
  • 42
    • 84901845189 scopus 로고    scopus 로고
    • Ookla Net Metrics available at
    • Ookla Net Metrics, Canada and US source data, available at: http://www.netindex.com/source-data/, 2011.
    • (2011) Canada and US Source Data
  • 44
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, in: EUROCRYPT, 1999.
    • (1999) EUROCRYPT
    • Paillier, P.1
  • 46
    • 33751069306 scopus 로고    scopus 로고
    • A secure protocol for computing string distance metrics
    • P. Ravikumar, W. Cohen and S. Fienberg, A secure protocol for computing string distance metrics, in: PSDM, 2004.
    • (2004) PSDM
    • Ravikumar, P.1    Cohen, W.2    Fienberg, S.3
  • 48
    • 0031108407 scopus 로고    scopus 로고
    • Deformable prototypes for encoding shape categories in image databases
    • S. Sclaroff, Deformable prototypes for encoding shape categories in image databases, Pattern Recognition 30(4) (1997), 627-641.
    • (1997) Pattern Recognition , vol.30 , Issue.4 , pp. 627-641
    • Sclaroff, S.1
  • 49
    • 77951113914 scopus 로고    scopus 로고
    • A privacy preserving Jaccard similarity function for mining encrypted data
    • M. Singh, P. Krishna and A. Saxena, A privacy preserving Jaccard similarity function for mining encrypted data, in: TENCON, 2009.
    • (2009) TENCON
    • Singh, M.1    Krishna, P.2    Saxena, A.3
  • 51
    • 0029736339 scopus 로고    scopus 로고
    • Tools and techniques for color image retrieval
    • J.R. Smith and S.-F. Chang, Tools and techniques for color image retrieval, in: SPIE, 1996.
    • (1996) SPIE
    • Smith, J.R.1    Chang, S.-F.2
  • 52
    • 70449467722 scopus 로고    scopus 로고
    • Impact of similarity measures on web-page clustering
    • A. Strehl, J. Ghosh and R. Mooney, Impact of similarity measures on web-page clustering, in: AAAI, 2000.
    • (2000) AAAI
    • Strehl, A.1    Ghosh, J.2    Mooney, R.3
  • 54
    • 10944227231 scopus 로고    scopus 로고
    • Secure set intersection cardinality with application to association rule mining
    • J. Vaidya and C. Clifton, Secure set intersection cardinality with application to association rule mining, Journal of Computer Security 13(4) (2005), 593-622.
    • (2005) Journal of Computer Security , vol.13 , Issue.4 , pp. 593-622
    • Vaidya, J.1    Clifton, C.2
  • 55
    • 66249113620 scopus 로고    scopus 로고
    • Efficient similarity joins for near duplicate detection
    • C. Xiao,W.Wang, X. Lin and J. Yu, Efficient similarity joins for near duplicate detection, in: WWW, 2008.
    • (2008) WWW
    • Xiao, C.1    Wang, W.2    Lin, X.3    Yu, J.4
  • 56
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. Yao, How to generate and exchange secrets, in: FOCS, 1986.
    • (1986) FOCS
    • Yao, A.1
  • 57
    • 84901828092 scopus 로고    scopus 로고
    • available at:
    • Youtube press release, available at: http://www.youtube.com/t/press- statistics.
    • Youtube Press Release
  • 58
    • 25844443821 scopus 로고    scopus 로고
    • Anonymous communications in mobile ad hoc networks
    • Y. Zhang, W. Liu and W. Lou, Anonymous communications in mobile ad hoc networks, in: INFOCOM, Vol. 3, 2005.
    • (2005) INFOCOM , vol.3
    • Zhang, Y.1    Liu, W.2    Lou, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.