Sciweavers

406 search results - page 1 / 82
» Privacy-Preserving Set Union
Sort
View
ACNS
2007
Springer
87views Cryptology» more  ACNS 2007»
13 years 6 months ago
Privacy-Preserving Set Union
Recently there has been a significant amount of work on privacy-preserving set operations, including: set intersection [14, 6, 21, 9], testing set disjointness [17], multi-set ope...
Keith B. Frikken
CRYPTO
2005
Springer
96views Cryptology» more  CRYPTO 2005»
13 years 10 months ago
Privacy-Preserving Set Operations
In many important applications, a collection of mutually distrustful parties must perform private computation over multisets. Each party’s input to the function is his private i...
Lea Kissner, Dawn Xiaodong Song
SAC
2005
ACM
13 years 10 months ago
Privacy preserving learning in negotiation
Machine learning techniques are widely used in negotiation systems. To get more accurate and satisfactory learning results, negotiation parties have the desire to employ learning ...
Sheng Zhang, Fillia Makedon
ASIACRYPT
2005
Springer
13 years 10 months ago
Privacy-Preserving Graph Algorithms in the Semi-honest Model
Abstract. We consider scenarios in which two parties, each in possession of a graph, wish to compute some algorithm on their joint graph in a privacy-preserving manner, that is, wi...
Justin Brickell, Vitaly Shmatikov
PDCAT
2007
Springer
13 years 11 months ago
Privacy Preserving Set Intersection Protocol Secure against Malicious Behaviors
When datasets are distributed on different sources, finding out their intersection while preserving the privacy of the datasets is a widely required task. In this paper, we addre...
Yingpeng Sang, Hong Shen