Presentation | 2011-11-15 Efficient Privacy Preserving Set Operations Atsuko MIYAJI, Mohammad RAHMAN, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Privacy Preserving set operations are useful for many data mining algori thms as building tools. Efficient computation of such set operations are desirable for practical implementations. In this paper, we build effici ent and private set operations. Our protocol is constructed in game-theo retic model. In other words, instead of being semi-honest or malicious, the adversaries are viewed as rational parties. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Privacy-preserving data mining / Set-intersection / Game theory / Computational Nash equilibrium |
Paper # | ISEC2011-51,LOIS2011-45 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2011/11/7(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | ENG |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Efficient Privacy Preserving Set Operations |
Sub Title (in English) | |
Keyword(1) | Privacy-preserving data mining |
Keyword(2) | Set-intersection |
Keyword(3) | Game theory |
Keyword(4) | Computational Nash equilibrium |
1st Author's Name | Atsuko MIYAJI |
1st Author's Affiliation | School of Information Science, Japan Advanced Institute of Science and Technology() |
2nd Author's Name | Mohammad RAHMAN |
2nd Author's Affiliation | School of Information Science, Japan Advanced Institute of Science and Technology |
Date | 2011-11-15 |
Paper # | ISEC2011-51,LOIS2011-45 |
Volume (vol) | vol.111 |
Number (no) | 285 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |