Summary cache: a scalable wide-area web cache sharing protocol
IEEE/ACM Transactions on Networking (TON)
Tools for privacy preserving distributed data mining
ACM SIGKDD Explorations Newsletter
Privacy preserving association rule mining in vertically partitioned data
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Information sharing across private databases
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Secure Construction of Contingency Tables from Distributed Data
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining
PAKDD '09 Proceedings of the 13th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining
Private Intersection of Certified Sets
Financial Cryptography and Data Security
ACML '09 Proceedings of the 1st Asian Conference on Machine Learning: Advances in Machine Learning
On private scalar product computation for privacy-preserving data mining
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Practical private set intersection protocols with linear complexity
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Hi-index | 0.00 |
This paper proposes a new privacy-preserving scheme for estimating the size of the intersection of two given secret subsets. Given the inner product of two Bloom filters (BFs) of the given sets, the proposed scheme applies Bayesian estimation under assumption of beta distribution for an a priori probability of the size to be estimated. The BF retains the communication complexity and the Bayesian estimation improves the estimation accuracy. An possible application of the proposed protocol is an epidemiological datasets regarding two attributes, Helicobactor pylori infection and stomach cancer. Assuming information related to Helicobactor Pylori infection and stomach cancer are separately collected, the protocol demonstrates that a χ2-test can be performed without disclosing the contents of the two confidential databases.