Presentation 2011-11-15
Efficient Privacy Preserving Set Operations
Atsuko MIYAJI, Mohammad RAHMAN,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Privacy Preserving set operations are useful for many data mining algori thms as building tools. Efficient computation of such set operations are desirable for practical implementations. In this paper, we build effici ent and private set operations. Our protocol is constructed in game-theo retic model. In other words, instead of being semi-honest or malicious, the adversaries are viewed as rational parties.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Privacy-preserving data mining / Set-intersection / Game theory / Computational Nash equilibrium
Paper # ISEC2011-51,LOIS2011-45
Date of Issue

Conference Information
Committee LOIS
Conference Date 2011/11/7(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Life Intelligence and Office Information Systems (LOIS)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Efficient Privacy Preserving Set Operations
Sub Title (in English)
Keyword(1) Privacy-preserving data mining
Keyword(2) Set-intersection
Keyword(3) Game theory
Keyword(4) Computational Nash equilibrium
1st Author's Name Atsuko MIYAJI
1st Author's Affiliation School of Information Science, Japan Advanced Institute of Science and Technology()
2nd Author's Name Mohammad RAHMAN
2nd Author's Affiliation School of Information Science, Japan Advanced Institute of Science and Technology
Date 2011-11-15
Paper # ISEC2011-51,LOIS2011-45
Volume (vol) vol.111
Number (no) 286
Page pp.pp.-
#Pages 8
Date of Issue