Affiliation:
1. Advanced Cryptosystems Research Group, National Institute of Advanced Industrial Science and Technology (AIST)
2. KDDI Research, Inc
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Applied Mathematics,Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Signal Processing
Reference35 articles.
1. [1] N. Attrapadung, G. Hanaoka, S. Kiyomoto, T. Mimoto, and J.C.N. Schuldt, “A taxonomy of secure two-party comparison protocols and efficient constructions,” PST 2017-15th International Conference on Privacy, Security and Trust, 2017. 10.1109/pst.2017.00033
2. [2] A.C.-C. Yao, “How to generate and exchange secrets,” Foundations of Computer Science, 1986, 27th Annual Symposium on, pp.162-167, IEEE, 1986. 10.1109/sfcs.1986.25
3. [3] O. Goldreich, S. Micali, and A. Wigderson, “How to play any mental game,” Proc. nineteenth annual ACM symposium on Theory of computing, pp.218-229, ACM, 1987. 10.1145/28395.28420
4. [4] P. Bunn and R. Ostrovsky, “Secure two-party k-means clustering,” Proc. 14th ACM conference on Computer and communications security, pp.486-497, ACM, 2007. 10.1145/1315245.1315306
5. [5] R. Ostrovsky, Y. Rabani, L.J. Schulman, and C. Swamy, “The effectiveness of lloyd-type methods for the k-means problem,” J. ACM, vol.59, no.6, p.28, 2012. 10.1145/2395116.2395117
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献