Distributed Set Intersection and Union with Local Differential Privacy
暂无分享,去创建一个
[1] Tsuyoshi Takagi,et al. Efficient Privacy-Preserving Reputation Evaluation in Decentralized Environments , 2014, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[2] A. P. Bowran. A Boolean Algebra , 1965 .
[3] Douglas J. Leith,et al. Optimal Differentially Private Mechanisms for Randomised Response , 2016, IEEE Transactions on Information Forensics and Security.
[4] Dawn Xiaodong Song,et al. Privacy-Preserving Set Operations , 2005, CRYPTO.
[5] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[6] Carmit Hazay,et al. Efficient Set Operations in the Presence of Malicious Adversaries , 2010, Journal of Cryptology.
[7] Florian Kerschbaum,et al. Outsourced private set intersection using homomorphic encryption , 2012, ASIACCS '12.
[8] Mingwu Zhang,et al. On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification , 2018, IEEE Transactions on Dependable and Secure Computing.
[9] M. Burkhart,et al. Fast Private Set Operations with SEPIA , 2012 .
[10] Chuankun Wu,et al. An Unconditionally Secure Protocol for Multi-Party Set Intersection , 2007, ACNS.
[11] Úlfar Erlingsson,et al. RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response , 2014, CCS.
[12] Aaron Roth,et al. Privately Releasing Conjunctions and the Statistical Query Barrier , 2013, SIAM J. Comput..
[13] Emiliano De Cristofaro,et al. Fast and Private Computation of Cardinality of Set Intersection and Union , 2012, CANS.
[14] Jonathan Katz,et al. Constant-Round Multi-party Private Set Union Using Reversed Laurent Series , 2012, Public Key Cryptography.
[15] Yin Yang,et al. Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy , 2016, CCS.
[16] Carmit Hazay,et al. Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs , 2015, Journal of Cryptology.
[17] Benjamin C. M. Fung,et al. Differentially private transit data publication: a case study on the montreal transportation system , 2012, KDD.
[18] Liusheng Huang,et al. Relation of PPAtMP and scalar product protocol and their applications , 2010, The IEEE symposium on Computers and Communications.
[19] Liusheng Huang,et al. Private Weighted Histogram Aggregation in Crowdsourcing , 2016, WASA.
[20] Anand D. Sarwate,et al. Signal Processing and Machine Learning with Differential Privacy: Algorithms and Challenges for Continuous Data , 2013, IEEE Signal Processing Magazine.
[21] Sofya Raskhodnikova,et al. What Can We Learn Privately? , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.
[22] Hong Shen,et al. Efficient and secure protocols for privacy-preserving set operations , 2009, TSEC.
[23] S L Warner,et al. Randomized response: a survey technique for eliminating evasive answer bias. , 1965, Journal of the American Statistical Association.
[24] Rolf Egert,et al. Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters , 2015, ACISP.
[25] Xiang Cheng,et al. Differentially Private Frequent Itemset Mining via Transaction Splitting , 2015, IEEE Transactions on Knowledge and Data Engineering.
[26] Atsuko Miyaji,et al. Privacy-Preserving Integration of Medical Data , 2017, Journal of Medical Systems.
[27] Changyu Dong,et al. When private set intersection meets big data: an efficient and scalable protocol , 2013, CCS.
[28] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[29] Ninghui Li,et al. PrivBasis: Frequent Itemset Mining with Differential Privacy , 2012, Proc. VLDB Endow..
[30] Moti Yung,et al. Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications , 2011, ACNS.