메뉴 건너뛰기




Volumn 30, Issue 2, 2013, Pages 18-28

Privacy-preserving nearest neighbor methods: Comparing signals without revealing them

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; NEAREST NEIGHBOR SEARCH; SIGNAL PROCESSING;

EID: 85032752211     PISSN: 10535888     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2012.2230221     Document Type: Article
Times cited : (66)

References (49)
  • 2
    • 80053027350 scopus 로고    scopus 로고
    • Secure and efficient protocols for iris and fingerprint identification
    • Leuven, Belgium, Sept
    • M. Blanton and P. Gasti, "Secure and efficient protocols for iris and fingerprint identification," in Proc. European Symp. Research Computer Security (ESORICS), Leuven, Belgium, Sept. 2011, pp. 190-209.
    • (2011) Proc. European Symp. Research Computer Security (ESORICS) , pp. 190-209
    • Blanton, M.1    Gasti, P.2
  • 7
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Advances in Cryptology, EUROCRYPT 99 New York: Springer
    • P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Advances in Cryptology, EUROCRYPT 99 (Lecture Notes in Computer Science, vol. 1592). New York: Springer, 1999, pp. 233-238.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 233-238
    • Paillier, P.1
  • 8
  • 9
    • 84867553981 scopus 로고    scopus 로고
    • A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
    • Public Key Cryptography
    • I. Damgård and M. Jurik, "A generalisation, a simplification and some applications of Paillier's probabilistic public-key system," in Proc. 4th Int. Workshop Practice and Theory Public Key Cryptosystems, Cheju Island, Korea, Feb. 2001, pp. 119-136. (Pubitemid 33232937)
    • (2001) Lecture Notes in Computer Science , Issue.1992 , pp. 119-136
    • Damgard, I.1    Jurik, M.2
  • 10
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • July
    • T. El-Gamal, "A public-key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inform. Theory, vol. 31, no. 4, pp. 469-472, July 1985.
    • (1985) IEEE Trans. Inform. Theory , vol.31 , Issue.4 , pp. 469-472
    • El-Gamal, T.1
  • 11
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-DNF formulas on ciphertexts
    • Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
    • D. Boneh, E.-J. Goh, and K. Nissim, "Evaluating 2-DNF formulas on ciphertexts," in Proc. Theory Cryptography Conf., 2005, pp. 325-341. (Pubitemid 41231172)
    • (2005) Lecture Notes in Computer Science , vol.3378 , pp. 325-341
    • Boneh, D.1    Goh, E.-J.2    Nissim, K.3
  • 12
    • 77649240581 scopus 로고    scopus 로고
    • Computing arbitrary functions of encrypted data
    • Mar.
    • C. Gentry, "Computing arbitrary functions of encrypted data," Commun. ACM, vol. 53, no. 3, pp. 97-105, Mar. 2010.
    • (2010) Commun. ACM , vol.53 , Issue.3 , pp. 97-105
    • Gentry, C.1
  • 13
    • 77954642756 scopus 로고    scopus 로고
    • Fully homomorphic encryption over the integers
    • Advances in Cryptology-EUROCRYPT 2010 H. Gilbert, Ed. New York: Springer
    • M. Van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, "Fully homomorphic encryption over the integers," in Advances in Cryptology-EUROCRYPT 2010 (Lecture Notes in Computer Science, vol. 6110), H. Gilbert, Ed. New York: Springer, 2010, pp. 24-43.
    • (2010) Lecture Notes in Computer Science , vol.6110 , pp. 24-43
    • Van Dijk, M.1    Gentry, C.2    Halevi, S.3    Vaikuntanathan, V.4
  • 18
    • 84898989941 scopus 로고
    • Founding cryptography on oblivious transfer
    • Chicago, IL, May
    • J. Kilian, "Founding cryptography on oblivious transfer," in Proc. ACM Symp. Theory Computing, Chicago, IL, May 1988, pp. 20-31.
    • (1988) Proc. ACM Symp. Theory Computing , pp. 20-31
    • Kilian, J.1
  • 19
    • 70449490535 scopus 로고    scopus 로고
    • Multiparty computation, an introduction
    • New York: Springer
    • R. Cramer and I. Damgård, "Multiparty computation, an introduction," in Contemp. Cryptol. New York: Springer, pp. 41-87, 2005.
    • (2005) Contemp. Cryptol , pp. 41-87
    • Cramer, R.1    Damgård, I.2
  • 20
    • 0001116877 scopus 로고
    • Binary codes capable of correcting deletions, insertions, and reversals
    • Feb
    • V. I. Levenshtein, "Binary codes capable of correcting deletions, insertions, and reversals," Soviet Phys. Doklady, vol. 10, no. 8, pp. 707-710, Feb. 1966.
    • (1966) Soviet Phys. Doklady , vol.10 , Issue.8 , pp. 707-710
    • Levenshtein, V.I.1
  • 25
    • 71549170830 scopus 로고    scopus 로고
    • Improved garbled circuit building blocks and applications to auctions and computing minima
    • Kanazawa, Japan Dec
    • V. Kolesnikov, A. Sadeghi, and T. Schneider, "Improved garbled circuit building blocks and applications to auctions and computing minima," in Proc. Cryptology and Network Security (CANS), Kanazawa, Japan, Dec. 2009, pp. 1-20.
    • (2009) Proc. Cryptology and Network Security (CANS) , pp. 1-20
    • Kolesnikov, V.1    Sadeghi, A.2    Schneider, T.3
  • 26
    • 85032751121 scopus 로고    scopus 로고
    • Encrypted signal processing for privacy protection
    • Jan.
    • I. Lagendijk, Z. Erkin, and M. Barni, "Encrypted signal processing for privacy protection," IEEE Signal Process. Mag., vol. 30, no. 1, pp. 85-102, Jan. 2013.
    • (2013) IEEE Signal Process. Mag , vol.30 , Issue.1 , pp. 85-102
    • Lagendijk, I.1    Erkin, Z.2    Barni, M.3
  • 27
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distributed computation," in Proc. ACM Symp. Theory Computing, 1988, pp. 1-10.
    • (1988) Proc. ACM Symp. Theory Computing , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 29
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 30
    • 84873943605 scopus 로고    scopus 로고
    • A full proof of the BGW protocol for perfectlysecure multiparty computation
    • New York: Springer, Santa Barbara, CA
    • G. Asharov and Y. Lindell, "A full proof of the BGW protocol for perfectlysecure multiparty computation," in Advances in Cryptology (CRYPTO 2011), New York: Springer, Santa Barbara, CA, 2011.
    • (2011) Advances in Cryptology (CRYPTO 2011)
    • Asharov, G.1    Lindell, Y.2
  • 32
    • 84957356475 scopus 로고    scopus 로고
    • Efficient Cryptographic Protocols Based on Noisy Channels
    • Advances in Cryptology - Eurocrypt '97
    • C. Crépeau, "Efficient cryptographic protocols based on noisy channels," in Advances in Cryptology (EUROCRYPT '97). New York: Springer, 1997, pp. 306-317. (Pubitemid 127067809)
    • (1997) Lecture Notes in Computer Science , Issue.1233 , pp. 306-317
    • Crepeau, C.1
  • 33
    • 39049110635 scopus 로고    scopus 로고
    • On the oblivious transfer capacity of noisy correlations
    • DOI 10.1109/ISIT.2006.261805, 4036292, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
    • A. Nascimento and A. Winter, "On the oblivious transfer capacity of noisy correlations," in Proc. IEEE Int. Symp. Information Theory (ISIT), Seattle, WA, July 2006, pp. 1871-1875. (Pubitemid 351244423)
    • (2006) IEEE International Symposium on Information Theory - Proceedings , pp. 1871-1875
    • Nascimento, A.C.A.1    Winter, A.2
  • 35
    • 70449482066 scopus 로고    scopus 로고
    • Bootstrapped oblivious transfer and secure two-party function computation
    • Seoul, Korea, June
    • Y. Wang and P. Ishwar, "Bootstrapped oblivious transfer and secure two-party function computation," in Proc. IEEE Int. Symp. Information Theory (ISIT), Seoul, Korea, June 2009, pp. 1303-1307.
    • (2009) Proc. IEEE Int. Symp. Information Theory (ISIT) , pp. 1303-1307
    • Wang, Y.1    Ishwar, P.2
  • 36
    • 0001654702 scopus 로고
    • Extensions of Lipschitz mappings into a Hilbert space, Conference in modern analysis and probability
    • W. Johnson and J. Lindenstrauss, "Extensions of Lipschitz mappings into a Hilbert space, Conference in modern analysis and probability," Contemp. Math, vol. 26, pp. 189-206, 1984.
    • (1984) Contemp. Math , vol.26 , pp. 189-206
    • Johnson, W.1    Lindenstrauss, J.2
  • 37
    • 84870584808 scopus 로고    scopus 로고
    • Quantized embeddings of scale-invariant image features for mobile augmented reality
    • Banff, AL, Canada 17-19 Sept
    • M. Li, S. Rane, and P. Boufounos, "Quantized embeddings of scale-invariant image features for mobile augmented reality," in Proc. IEEE Int. Workshop Multimedia Signal Processing, Banff, AL, Canada, 17-19 Sept. 2012.
    • (2012) Proc. IEEE Int. Workshop Multimedia Signal Processing
    • Li, M.1    Rane, S.2    Boufounos, P.3
  • 40
    • 37549058056 scopus 로고    scopus 로고
    • Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions
    • A. Andoni and P. Indyk, "Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions," Commun. ACM, vol. 51, no. 1, pp. 117-122, 2008.
    • (2008) Commun. ACM , vol.51 , Issue.1 , pp. 117-122
    • Andoni, A.1    Indyk, P.2
  • 44
    • 35348998047 scopus 로고    scopus 로고
    • Low distortion embeddings for edit distance
    • R. Ostrovsky and Y. Rabani, "Low distortion embeddings for edit distance," J. ACM, vol. 54, no. 5, pp. 23, 2007.
    • (2007) J. ACM , vol.54 , Issue.5 , pp. 23
    • Ostrovsky, R.1    Rabani, Y.2
  • 45
    • 78349236191 scopus 로고    scopus 로고
    • Privacy-preserving approximation of, 1 distance for multimedia applications
    • Singapore, July
    • S. Rane, W. Sun, and A. Vetro, "Privacy-preserving approximation of, 1 distance for multimedia applications," in Proc. IEEE Int. Conf. Multimedia and Expo (ICME), Singapore, July 2010, pp. 492-497.
    • (2010) Proc. IEEE Int. Conf. Multimedia and Expo (ICME) , pp. 492-497
    • Rane, S.1    Sun, W.2    Vetro, A.3
  • 48
    • 78651068288 scopus 로고    scopus 로고
    • Security analysis for privacy preserving multimedia retrieval
    • Hong Kong, Sept
    • W. Lu, A. Varna, and M. Wu, "Security analysis for privacy preserving multimedia retrieval," in Proc. IEEE Int. Conf. Image Processing (ICIP), Hong Kong, Sept. 2010, pp. 2093-2096.
    • (2010) Proc. IEEE Int. Conf. Image Processing (ICIP) , pp. 2093-2096
    • Lu, W.1    Varna, A.2    Wu, M.3
  • 49
    • 78651096334 scopus 로고    scopus 로고
    • Multimedia forensic hash based on visual words
    • Hong Kong, Sept
    • W. Lu and M. Wu, "Multimedia forensic hash based on visual words," in Proc. IEEE Int. Conf. Image Processing (ICIP), Hong Kong, Sept. 2010, pp. 989-992.
    • (2010) Proc. IEEE Int. Conf. Image Processing (ICIP) , pp. 989-992
    • Lu, W.1    Wu, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.