Privacy Preservation in Distributed Environment Using RSA-CRT
暂无分享,去创建一个
Prasant Kumar Pattnaik | Yogesh Sharma | Raghvendra Kumar | P. Pattnaik | Raghvendra Kumar | Yogesh Sharma
[1] William Stallings,et al. Cryptography and network security , 1998 .
[2] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .
[3] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[4] Yehuda Lindell,et al. Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..
[5] Dan Boneh,et al. Fast Variants of RSA , 2007 .
[6] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[7] Jayant R. Haritsa,et al. On Addressing Efficiency Concerns in Privacy-Preserving Mining , 2003, DASFAA.
[8] Zhang Peng,et al. An Effective Method for Privacy Preserving Association Rule Mining , 2006 .
[9] Hung-Min Sun,et al. An Approach Towards Rebalanced RSA-CRT with Short Public Exponent , 2005, IACR Cryptol. ePrint Arch..
[10] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.