Zero-knowledge test of vector equivalence granulation of user data with privacy
暂无分享,去创建一个
[1] Leonid A. Levin,et al. Fair Computation of General Functions in Presence of Immoral Majority , 1990, CRYPTO.
[2] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[3] Donald Beaver,et al. Multiparty Computation with Faulty Majority , 1989, CRYPTO.
[4] John F. Canny,et al. Collaborative filtering with privacy , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[5] Z. Pawlak. Rough Sets: Theoretical Aspects of Reasoning about Data , 1991 .
[6] J. Markus,et al. Millimix: Mixing in Small Batches , 1999 .
[7] Churn-Jung Liau,et al. A generalized decision logic language for granular computing , 2002, 2002 IEEE World Congress on Computational Intelligence. 2002 IEEE International Conference on Fuzzy Systems. FUZZ-IEEE'02. Proceedings (Cat. No.02CH37291).
[8] Ivan Damgård,et al. Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free? , 1998, CRYPTO.
[9] Lotfi A. Zadeh,et al. Fuzzy sets and information granularity , 1996 .
[10] Yitao Duan,et al. Practical private computation of vector addition-based functions , 2007, PODC '07.
[11] Janusz Zalewski,et al. Rough sets: Theoretical aspects of reasoning about data , 1996 .
[12] Tsau Young Lin,et al. Granular Computing on Binary Relations , 2002, Rough Sets and Current Trends in Computing.
[13] Zdzislaw Pawlak,et al. Reasoning about Data - A Rough Set Perspective , 1998, Rough Sets and Current Trends in Computing.
[14] Andrzej Skowron,et al. Toward Intelligent Systems: Calculi of Information Granules , 2001, JSAI Workshops.
[15] Yiyu Yao,et al. A Partition Model of Granular Computing , 2004, Trans. Rough Sets.
[16] Ivan Damgård,et al. Zero-Knowledge Proofs for Finite Field Arithmetic or: Can Zero-Knowledge be for Free? , 1997 .
[17] Yiyu Yao,et al. Granular computing using information tables , 2002 .
[18] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[19] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[20] Tal Rabin,et al. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography , 1998, PODC '98.
[21] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.