Sciweavers

23 search results - page 2 / 5
» Oblivious Polynomial Evaluation and Oblivious Neural Learnin...
Sort
View
FC
2009
Springer
67views Cryptology» more  FC 2009»
13 years 9 months ago
Privacy-Preserving Classifier Learning
We present an efficient protocol for the privacy-preserving, distributed learning of decision-tree classifiers. Our protocol allows a user to construct a classifier on a database h...
Justin Brickell, Vitaly Shmatikov
ICC
2007
IEEE
165views Communications» more  ICC 2007»
14 years 2 days ago
Oblivious Keyword Search Protocols in the Public Database Model
— Databases associated with keywords, can be public, private or hybrid, as a result the solutions to keyword search protocols for each type are different. In this paper, we study...
Huafei Zhu, Feng Bao
CLUSTER
2009
IEEE
14 years 15 days ago
Oblivious routing schemes in extended generalized Fat Tree networks
—A family of oblivious routing schemes for Fat Trees and their slimmed versions is presented in this work. First, two popular oblivious routing algorithms, which we refer to as S...
Germán Rodríguez, Cyriel Minkenberg,...
CANS
2011
Springer
258views Cryptology» more  CANS 2011»
12 years 5 months ago
Fast Computation on Encrypted Polynomials and Applications
In this paper, we explore fast algorithms for computing on encrypted polynomials. More specifically, we describe efficient algorithms for computing the Discrete Fourier Transform,...
Payman Mohassel
EUROCRYPT
2000
Springer
13 years 9 months ago
Noisy Polynomial Interpolation and Noisy Chinese Remaindering
Abstract. The noisy polynomial interpolation problem is a new intractability assumption introduced last year in oblivious polynomial evaluation. It also appeared independently in p...
Daniel Bleichenbacher, Phong Q. Nguyen