Sciweavers

96 search results - page 4 / 20
» Revealing Additional Information in Two-Party Computations
Sort
View
EDBT
2010
ACM
181views Database» more  EDBT 2010»
13 years 6 months ago
Private record matching using differential privacy
Private matching between datasets owned by distinct parties is a challenging problem with several applications. Private matching allows two parties to identify the records that ar...
Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Eli...
SAC
2006
ACM
14 years 1 months ago
Efficient query routing for information retrieval in semantic overlays
A fundamental problem in peer-to-peer networks is how to locate appropriate peers efficiently to answer a specific query request. This paper proposes a model in which semantically...
Hai Jin, Xiaoming Ning, Hanhua Chen, Zuoning Yin
STOC
2007
ACM
102views Algorithms» more  STOC 2007»
14 years 7 months ago
Zero-knowledge from secure multiparty computation
A zero-knowledge proof allows a prover to convince a verifier of an assertion without revealing any further information beyond the fact that the assertion is true. Secure multipar...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...
VLDB
2007
ACM
137views Database» more  VLDB 2007»
14 years 7 months ago
Fast Data Anonymization with Low Information Loss
Recent research studied the problem of publishing microdata without revealing sensitive information, leading to the privacy preserving paradigms of k-anonymity and -diversity. k-a...
Gabriel Ghinita, Panagiotis Karras, Panos Kalnis, ...
ICISC
2007
134views Cryptology» more  ICISC 2007»
13 years 9 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim