An efficient privacy-preserving P2P protocol for computing maximum value in the presence of active adversaries
Author:
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Link
http://link.springer.com/article/10.1007/s12083-016-0490-z/fulltext.html
Reference21 articles.
1. Du W, Atallah, MJ (2000) Secure multiparty computation problems and their applications: A review and open problems. Proceedings of New Security Paradigms Workshop, 11–20
2. Yao AC (1982) Protocols for Secure Computations. In: 23rd IEEE Symposium on Foundations of Computer Science (FOCS’82). IEEE Computer Security, 160–164
3. Lindell Y, Pinkas B (2009) Secure multiparty computation for privacy-preserving data mining. Journal of Privacy and Confidentiality 1:59–98
4. Brandt F (2006) How to obtain full privacy in auctions. Int J Inf Secur 5:201–216
5. Cramer R, Franklin MK, Schoenmakers B, Yung M (1996) Multi-authority secret-ballot elections with linear work. In: Proceedings of advanced in cryptology (EUROCRYPT’69), 72–83
Cited by 3 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Privacy-preserving quantum protocol for finding the maximum value;EPJ Quantum Technology;2022-05-12
2. Secure Determining of the k-th Greatest Element Among Distributed Private Values;2021 26th International Computer Conference, Computer Society of Iran (CSICC);2021-03-03
3. An Efficient Privacy-Preserving Protocol for Computing kth Minimum Value in P2P Networks;Journal of Circuits, Systems and Computers;2019-11-15
1.学者识别学者识别
2.学术分析学术分析
3.人才评估人才评估
"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370
www.globalauthorid.com
TOP
Copyright © 2019-2024 北京同舟云网络信息技术有限公司 京公网安备11010802033243号 京ICP备18003416号-3