A Framework for Fully-Simulatable -out-of- Oblivious Transfer

B Zeng, C Tartary, C Hsu - Cryptology ePrint Archive, 2010 - eprint.iacr.org
Oblivious transfer is a fundamental building block for multiparty computation protocols. In
this paper, we present a generally realizable framework for fully-simulatable $ t $-out-of-$ n …

Preserving differential privacy between features in distributed estimation

C Heinze-Deml, B McWilliams… - arXiv preprint arXiv …, 2017 - arxiv.org
Privacy is crucial in many applications of machine learning. Legal, ethical and societal
issues restrict the sharing of sensitive data making it difficult to learn from datasets that are …

A Multi-party Vertically Partitioned Data Synthesis Mechanism with Personalized Differential Privacy

Y ZHU, K WANG, Y ZHOU - 电子与信息学报, 2024 - jeit.ac.cn
In today's era, with the rapid development of big data technology and the continuous
increase in data volume, large amounts of data are constantly collected by different …

Adaptive Differential Privacy for Decentralized Mobility Data Sharing and Forecasting

FZ Errounda - 2023 - spectrum.library.concordia.ca
Mobility data is the cornerstone of crucial applications, including traffic monitoring,
crowdsourcing, and social networks. However, research shows that publishing accurate …

A Survey and Taxonomy of Distributed Data Mining Research Studies: A Systematic Literature Review

FA Rafrastara, Q Deyu - arXiv preprint arXiv:2009.10618, 2020 - arxiv.org
Context: Data Mining (DM) method has been evolving year by year and as of today there is
also the enhancement of DM technique that can be run several times faster than the …

[图书][B] Differential Privacy, Federated Learning, and Privacy-Preserving Credit Risk Modeling

H Zhang - 2023 - search.proquest.com
Given the sheer size of the consumer credit market and the huge number of consumer credit
users, credit risk modeling, or predicting delinquent (or default) probabilities of borrowers to …

A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage

X Wang, B Yang, Z Xia, H Hou - Frontiers of Information Technology & …, 2019 - Springer
With the development of cloud computing technology, data can be outsourced to the cloud
and conveniently shared among users. However, in many circumstances, users may have …

一种基于Chaum-Pedersen 协议的欺骗可检测云存储数据共享协议

X Wang, B Yang, Z Xia, H Hou, AX Wang, AB Yang… - Frontiers, 2019 - jzus.zju.edu.cn
随着云计算技术的发展, 数据可外包给云, 方便用户共享. 然而, 用户常常担心其数据在云端的
可靠性和完整性. 因此, 在云端提供安全的数据共享服务至关重要. 本文将门限秘密共享技术和 …

Founding cryptography on smooth projective hashing

B Zeng - Cryptology ePrint Archive, 2018 - eprint.iacr.org
Oblivious transfer (OT) is a fundamental primitive in cryptography. Halevi-Kalai OT (Halevi,
S. and Y. Kalai (2012), Journal of Cryptology 25 (1)), which is based on smooth projective …

[PDF][PDF] Privacy-Preserving Data Aggregation Framework for Mobile Service Based Multiuser Collaboration

H Liu, Z Wu, C Peng, F Tian, L Lu - The International Arab Journal of …, 2020 - ccis2k.org
Considering the untrusted server, differential privacy and local differential privacy has been
used for privacypreserving in data aggregation. Through our analysis, differential privacy …