Secure multi-party computation problems and their applications: a review and open problems
Proceedings of the 2001 workshop on New security paradigms
A practical approach to solve Secure Multi-party Computation problems
Proceedings of the 2002 workshop on New security paradigms
Privacy-preserving k-means clustering over vertically partitioned data
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Leveraging the "Multi" in secure multi-party computation
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Privacy-preserving Bayesian network structure computation on distributed heterogeneous data
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Private collaborative forecasting and benchmarking
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Cardinality-based inference control in OLAP systems: an information theoretic approach
Proceedings of the 7th ACM international workshop on Data warehousing and OLAP
A study of secure multi-party elementary function computation protocols
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Privacy preserving learning in negotiation
Proceedings of the 2005 ACM symposium on Applied computing
A privacy-preserving collaborative filtering scheme with two-way communication
EC '06 Proceedings of the 7th ACM conference on Electronic commerce
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Proceedings of the 2006 ACM symposium on Applied computing
A privacy-preserving protocol for neural-network-based computation
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Privacy-preserving performance measurements
Proceedings of the 2006 SIGCOMM workshop on Mining network data
Accessing Minimal-Impact Personal Audio Archives
IEEE MultiMedia
Secure set intersection cardinality with application to association rule mining
Journal of Computer Security
The privacy of k-NN retrieval for horizontal partitioned data: new methods and applications
ADC '07 Proceedings of the eighteenth conference on Australasian database - Volume 63
Privacy-preservation for gradient descent methods
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-preserving regression algorithms
SMO'07 Proceedings of the 7th WSEAS International Conference on Simulation, Modelling and Optimization
A new efficient privacy-preserving scalar product protocol
AusDM '07 Proceedings of the sixth Australasian conference on Data mining and analytics - Volume 70
Privacy-preserving Naïve Bayes classification
The VLDB Journal — The International Journal on Very Large Data Bases
An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining
PAKDD '09 Proceedings of the 13th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining
Impossibility of unconditionally secure scalar products
Data & Knowledge Engineering
A distributed approach to enabling privacy-preserving model-based classifier training
Knowledge and Information Systems
Toward empirical aspects of secure scalar product
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews - Special issue on information reuse and integration
Security analysis of the Louis protocol for location privacy
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Communication-Efficient Privacy-Preserving Clustering
Transactions on Data Privacy
Securely outsourcing linear algebra computations
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Extended private information retrieval and its application in biometrics authentications
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
APHID: An architecture for private, high-performance integrated data mining
Future Generation Computer Systems
Theory of privacy and anonymity
Algorithms and theory of computation handbook
An efficient cacheable secure scalar product protocol for privacy-preserving data mining
DaWaK'11 Proceedings of the 13th international conference on Data warehousing and knowledge discovery
Privacy-preserving statistical analysis on ubiquitous health data
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
Information theoretical analysis of two-party secret computation
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Privacy-Preserving graph algorithms in the semi-honest model
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Privacy preserving DBSCAN for vertically partitioned data
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Secrecy of two-party secure computation
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Secure computation of the mean and related statistics
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Performance measurements for privacy preserving data mining
PAKDD'05 Proceedings of the 9th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
On private scalar product computation for privacy-preserving data mining
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Modulo reduction for paillier encryptions and application to secure statistical analysis
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
A Semantics-based Approach to Large-Scale Mobile Social Networking
Mobile Networks and Applications
Efficient and Practical Approach for Private Record Linkage
Journal of Data and Information Quality (JDIQ)
Approximate privacy-preserving data mining on vertically partitioned data
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Computing join aggregates over private tables
DaWaK'07 Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery
Privacy-preserving genetic algorithms for rule discovery
DaWaK'07 Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery
DaWaK'07 Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery
Privacy-preserving self-organizing map
DaWaK'07 Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery
A Privacy Preserving Markov Model for Sequence Classification
Proceedings of the International Conference on Bioinformatics, Computational Biology and Biomedical Informatics
An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps
Journal of Medical Systems
Hi-index | 0.00 |
The growth of the Internet opens up tremendous opportunitiesfor cooperative computation, where the answer dependson the private inputs of separate entities. Sometimesthese computations may occur between mutually untrustingentities. The problem is trivial if the context allows the conductof these computations by a trusted entity that wouldknow the inputs from all the participants; however if thecontext disallows this then the techniques of secure multipartycomputation become very relevant and can provideuseful solutions.Statistic analysis is a widely used computation in reallife, but the known methods usually require one to know thewhole data set; little work has been conducted to investigatehow statistical analysis could be performed in a cooperativeenvironment, where the participants want to conduct statisticalanalysis on the joint data set, but each participantis concerned about the confidentiality of its own data. Inthis paper we have developed protocols for conducting thestatistic analysis in such kind of cooperative environmentbased on a data perturbation technique and cryptographyprimitives,