Privacy-preserving machine learning with multiple data providers

P Li, T Li, H Ye, J Li, X Chen, Y Xiang - Future Generation Computer …, 2018 - Elsevier
With the fast development of cloud computing, more and more data storage and computation
are moved from the local to the cloud, especially the applications of machine learning and …

Efficient privacy-preserving outsourced k-means clustering on distributed data

G Qiu, Y Zhao, X Gui - Information Sciences, 2024 - Elsevier
Today, more and more data is collected and stored by different organizations. When the data
is distributed among multiple users who wish to perform data mining on the joint data …

Highly Secure Privacy‐Preserving Outsourced k‐Means Clustering under Multiple Keys in Cloud Computing

Y Zou, Z Zhao, S Shi, L Wang, Y Peng… - Security and …, 2020 - Wiley Online Library
Data clustering is the unsupervised classification of data records into groups. As one of the
steps in data analysis, it has been widely researched and applied in practical life, such as …

Privacy‐Preserving k‐Means Clustering under Multiowner Setting in Distributed Cloud Environments

H Rong, H Wang, J Liu, J Hao… - Security and …, 2017 - Wiley Online Library
With the advent of big data era, clients who lack computational and storage resources tend
to outsource data mining tasks to cloud service providers in order to improve efficiency and …

A blockchain-assisted privacy-preserving cloud computing method with multiple keys

L Huang, L Xu, L Zhu, K Gai - 2021 IEEE 6th International …, 2021 - ieeexplore.ieee.org
How to analyze users' data without compromising individual privacy is an important issue in
cloud computing. In order to protect privacy and enable the cloud to perform computing …

基于k-Lin 假设的同态加密方案

赖俊祚, 黄正安, 翁健, 吴永东 - 软件学报, 2022 - jos.org.cn
作为数字货币的底层核心技术之一, 区块链随着数字货币的快速发展而受到了广泛关注.
由于区块链具有去中心化, 防篡改, 可追溯等性质, 如今越来越多的企业和个人用户选择利用区块 …

On the security of public key cryptosystems with a double decryption mechanism

D Galindo, J Herranz - Information Processing Letters, 2008 - Elsevier
In public key encryption schemes with a double decryption mechanism (DD–PKE),
decryption can be done in either of two ways: by the user owning the secret/public key pair …

Additively homomorphic encryption with a double decryption mechanism, revisited

A Peter, M Kronberg, W Trei… - Information Security: 15th …, 2012 - Springer
We revisit the notion of additively homomorphic encryption with a double decryption
mechanism (DD-PKE), which allows for additions in the encrypted domain while having a …

Outsourced k-Means Clustering over Encrypted Data Under Multiple Keys in Spark Framework

H Rong, H Wang, J Liu, J Hao, M Xian - … Falls, ON, Canada, October 22–25 …, 2018 - Springer
As the quantity of data produced is rapidly rising in recent years, clients lack of
computational and storage resources tend to outsource data mining tasks to cloud service …

Privacy-Preserving sensitive data on Medical diagnosis using Federated Learning and Homomorphic Re-encryption

J Dasari, TS Joshith, DD Lokesh… - 2023 3rd …, 2023 - ieeexplore.ieee.org
Federated learning is an emerging technique that allows multiple participants to train a
shared model without exchanging their private data. This approach is particularly useful for …