Privacy Assurances in Multiple Data-Aggregation Transactions
From MaRDI portal
Publication:3193250
DOI10.1007/978-3-319-12160-4_1zbMath1445.68086OpenAlexW97579310MaRDI QIDQ3193250
No author found.
Publication date: 16 October 2015
Published in: Information Security and Cryptology -- ICISC 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-12160-4_1
secure multiparty computationcryptosystemssocial network securitymultiple data-aggregation transactionsprivacy data assurancethird-party application
Modes of computation (nondeterministic, parallel, interactive, probabilistic, etc.) (68Q10) Cryptography (94A60) Privacy of data (68P27)
Cites Work
- Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces
- Secure Multiparty Computation Goes Live
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Foundations of Cryptography
- Fully homomorphic encryption using ideal lattices
- Secure Computation on the Web: Computing without Simultaneous Interaction
- On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
This page was built for publication: Privacy Assurances in Multiple Data-Aggregation Transactions