Sciweavers

SIGKDD
2002

Cryptographic Techniques for Privacy-Preserving Data Mining

13 years 11 months ago
Cryptographic Techniques for Privacy-Preserving Data Mining
Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. It was shown that non-trusting parties can jointly compute functions of their different inputs while ensuring that no party learns anything but the defined output of the function. These results were shown using generic constructions that can be applied to any function that has an efficient representation as a circuit. We describe these results, discuss their efficiency, and demonstrate their relevance to privacy preserving computation of data mining algorithms. We also show examples of secure computation of data mining algorithms that use these generic constructions.
Benny Pinkas
Added 23 Dec 2010
Updated 23 Dec 2010
Type Journal
Year 2002
Where SIGKDD
Authors Benny Pinkas
Comments (0)