Network system, server and information terminal for list matching

作者: Masayuki Numao , Yuji Watanabe

DOI:

关键词:

摘要: A method, apparatus and system to ensure the security in information exchange provide list matching with higher efficiency practicality. In a particular embodiment, each of lists be subject is represented as polynomial having roots equivalent items list. Then, polynomials generated for are added according distributed secret computation. containing an item root resulting from addition created output common item.

参考文章(32)
Alan Siegel, Jeanette P. Schmidt, On Aspects of Universality and Performance for Closed Hashing (Extended Abstract) symposium on the theory of computing. pp. 355- 366 ,(1989)
Yehuda Lindell, Benny Pinkas, Privacy Preserving Data Mining international cryptology conference. pp. 36- 54 ,(2000) , 10.1007/3-540-44598-6_3
Ronald K. Grooters, Aortic cannula with spoon-shaped lip ,(2000)
Amir Herzberg, Shay Kutten, Marcel Mordechay Yung, Method and apparatus for authenticating users of a communication system to each other ,(1992)
Ralf Koetter, Alexander Vardy, Algebraic soft decoding of reed-solomon codes ,(2000)
Siu-Leong Iu, Guillaume Mercier, Jack Ehrhardt, Michael Bergeron, Robert W. Schumann, Kobad Bugwadia, Shiva Ramadoss, System and methodology for tracing to a source of unauthorized copying of prerecorded proprietary material, such as movies ,(1999)
Eric Pouyoul, Gregory L. Slaughter, Thomas E. Saulpaugh, Message conductors in a distributed computing environment ,(2000)