Secure Multiparty Computation for Privacy-Preserving Data Mining

作者: Yehuda Lindell , Benny Pinkas

DOI: 10.29012/JPC.V1I1.566

关键词:

摘要: In this paper, we survey the basic paradigms and notions of secure mul- tiparty computation discuss their relevance to fleld privacy-preserving data mining. addition reviewing deflnitions constructions for computation, issue e-ciency demonstrate di-cul- ties involved in constructing highly e-cient protocols. We also present common errors that are prevalent literature when multiparty techniques applied Finally, relationship between mining, show which problems it solves does not.

参考文章(41)
Oded Goldreich, , Silvio Micali, Avi Wigderson, , , How to play any mental game, or a completeness theorem for protocols with honest majority Providing Sound Foundations for Cryptography. pp. 307- 328 ,(2019) , 10.1145/3335741.3335755
Yuval Ishai, Joe Kilian, Kobbi Nissim, Erez Petrank, Extending Oblivious Transfers Efficiently Advances in Cryptology - CRYPTO 2003. pp. 145- 161 ,(2003) , 10.1007/978-3-540-45146-4_9
Noam Nisan, Benny Pinkas, Yaron Sella, Dahlia Malkhi, Fairplay—a secure two-party computation system usenix security symposium. pp. 20- 20 ,(2004)
Bill Aiello, Yuval Ishai, Omer Reingold, Priced Oblivious Transfer: How to Sell Digital Goods Lecture Notes in Computer Science. pp. 119- 135 ,(2001) , 10.1007/3-540-44987-6_8
Yonatan Aumann, Yehuda Lindell, Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries Theory of Cryptography. pp. 137- 156 ,(2007) , 10.1007/978-3-540-70936-7_8
Gagan Aggarwal, Nina Mishra, Benny Pinkas, Secure Computation of the k th -Ranked Element theory and application of cryptographic techniques. pp. 40- 55 ,(2004) , 10.1007/978-3-540-24676-3_3
Donald Beaver, Foundations of Secure Interactive Computing international cryptology conference. pp. 377- 391 ,(1991) , 10.1007/3-540-46766-1_31
Ronald Cramer, Ivan Damgård, Jesper B. Nielsen, Multiparty Computation from Threshold Homomorphic Encryption theory and application of cryptographic techniques. pp. 280- 299 ,(2001) , 10.1007/3-540-44987-6_18
Yehuda Lindell, Benny Pinkas, A Proof of Yao's Protocol for Secure Two-Party Computation Electronic Colloquium on Computational Complexity. ,(2004)