STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Optimistic protocols for fair exchange
Proceedings of the 4th ACM conference on Computer and communications security
A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Client/Server Tradeoffs for Online Elections
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Foundations of Cryptography: Volume 2, Basic Applications
Foundations of Cryptography: Volume 2, Basic Applications
Deriving private information from randomized data
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Privacy-preservation for gradient descent methods
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-preserving Naïve Bayes classification
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy-preserving decision trees over vertically partitioned data
ACM Transactions on Knowledge Discovery from Data (TKDD)
Opportunities for private and secure machine learning
Proceedings of the 1st ACM workshop on Workshop on AISec
OptRR: Optimizing Randomized Response Schemes for Privacy-Preserving Data Mining
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Privacy-Preserving Gradient-Descent Methods
IEEE Transactions on Knowledge and Data Engineering
Efficient and secure evaluation of multivariate polynomials and applications
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Stand-Alone and setup-free verifiably committed signatures
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Hi-index | 0.00 |
Linear regression is a basic statistical method to correlate two or more attributes in data mining, machine learning, decision tree and Bayes classification. This paper studies non-black-box two-party computation of linear regression protocols with malicious adversaries. The contribution of this paper comprises the following three-fold: - in the first fold, a general two-party computation model for linear regression protocols is introduced and formalized; - in the second fold, a non-black-box two-party computation of linear regression protocols based on the Goldreich, Micali and Wigderson's compiler technique is presented; - in the third fold, we show that the proposed non-black-box construction toleratesmalicious adversaries in the simulation-based framework assuming that the underlying Damgård and Jurik's public key encryption scheme is semantically secure and the Damgård-Fujisaki commitment scheme is statistically hiding and computationally binding.