Privacy Preserving Data Mining
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Secure Multi-party Computational Geometry
WADS '01 Proceedings of the 7th International Workshop on Algorithms and Data Structures
Foundations of Cryptography: Volume 2, Basic Applications
Foundations of Cryptography: Volume 2, Basic Applications
IDEAS '05 Proceedings of the 9th International Database Engineering & Application Symposium
Hi-index | 0.00 |
Under the cloud computing environment, the privacy-preserving fuzzy comprehensive evaluation problem is proposed and solved, which has not been studied in the area of secure multi-party computation. Besides, through the analysis of the protocol's security, an improved protocol whose security is higher is given based on blind-and-permute protocol and privacy-preserving protocol of finding the maximum component's position, whose security is stated using the simulation paradigm at last. The experimental results map out the correct possibilities for our algorithm.