• No results found

[PDF] Top 20 When private set intersection meets big data : an efficient and scalable protocol

Has 10000 "When private set intersection meets big data : an efficient and scalable protocol" found on our website. Below are the top 20 most common "When private set intersection meets big data : an efficient and scalable protocol".

When private set intersection meets big data : an efficient and scalable protocol

When private set intersection meets big data : an efficient and scalable protocol

... first protocol of Private Set Intersection were introduced by Freedman et al in ...Their protocol is based on oblivious polynomial ...more efficient in the presence of mali- ... See full document

29

VD-PSI : verifiable delegated private set intersection on outsourced private datasets

VD-PSI : verifiable delegated private set intersection on outsourced private datasets

... some efficient protocols, like [9, 28, 27], have been ...the intersection of their ...his data and uses tags based on bilinear maps for ...the intersection to the ...the data and ... See full document

17

Faster  Private  Set  Intersection  based  on  OT  Extension

Faster Private Set Intersection based on OT Extension

... Several efficient server-aided protocol for PSI were pre- sented and benchmarked in ...PSI protocol with a semi-honest server, the authors report a runtime of ...communicated data. In ... See full document

21

Fair private set intersection with a semi-trusted arbiter

Fair private set intersection with a semi-trusted arbiter

... PSI protocol must be fair, i.e. if one party knows the intersection, the other party should also know ...the protocol for the honest ...some private information and therefore has to be fully ... See full document

16

Invertible  Polynomial  Representation  for  Private  Set  Operations

Invertible Polynomial Representation for Private Set Operations

... most private set intersection protocols based on polynomial representations and AHE schemes, it is hard to factor the resulting polynomial corresponded to the intersection of ...the set ... See full document

24

On  the  performance  of  certain  Private  Set  Intersection  protocols

On the performance of certain Private Set Intersection protocols

... need data transfer, it is more efficient to use the Exponential ElGamal cryptosystem [ElG85] ...provide efficient decryption, however, it allows client to test whether a ciphertext is an encryption ... See full document

20

O-PSI : delegated private set intersection on outsourced datasets

O-PSI : delegated private set intersection on outsourced datasets

... a protocol that allows clients to outsource their private datasets and delegate PSI computation to a ...The protocol allows clients to independently prepare and outsource their private ... See full document

14

Two-party  Private  Set  Intersection  with  an  Untrusted  Third  Party

Two-party Private Set Intersection with an Untrusted Third Party

... secure when a majority of parties are honest have much lower bandwidth requirements than those that tolerate a malicious ...their private computation by secret sharing their input among three servers, with ... See full document

31

Efficient  Delegated  Private  Set  Intersection  on  Outsourced  Private  Datasets

Efficient Delegated Private Set Intersection on Outsourced Private Datasets

... e.g. data storage, hardware and software. In delegated PSI, data storage and computation are now outsourced to a cloud ...accidentally, data privacy ...a protocol for this model is more ... See full document

15

Combining  Private  Set-Intersection  with  Secure  Two-Party  Computation

Combining Private Set-Intersection with Secure Two-Party Computation

... our protocol with the PSI protocols provided in [PSZ16] and to be consistent with their complexity analysis, we consider only the computation complexity for the party with the majority of the workload in the ... See full document

30

Private  Set  Intersection  with  Linear  Communication  from  General  Assumptions

Private Set Intersection with Linear Communication from General Assumptions

... (PWC) protocol, and is included only as a baseline, or straw-man ...the intersection will occur twice in two adjacent ...the intersection can be computed using 2m − 1 secure comparisons (comparing ... See full document

40

Approximating  Private  Set  Union/Intersection  Cardinality  with  Logarithmic  Complexity

Approximating Private Set Union/Intersection Cardinality with Logarithmic Complexity

... where data becomes increasingly important. On one hand, data drives scientific research, business analytics, and government decision ...of data have become an indispensable part of nearly ...hand, ... See full document

20

Phasing:  Private  Set  Intersection  using  Permutation-based  Hashing

Phasing: Private Set Intersection using Permutation-based Hashing

... An alternative method of measuring ad performance is to compare the list of people who have seen an ad with those who have completed a transaction. These lists are held by the advertiser (say, Google or Facebook), and by ... See full document

21

Towards Efficient and Scalable Data Intensive Content Delivery: State of the Art, Issues and Challenges

Towards Efficient and Scalable Data Intensive Content Delivery: State of the Art, Issues and Challenges

... positioning data, privacy concerns regarding location-awareness and the challenge of how to associate information objects, such as a web page, with a real-world ...issues when their location is to be known ... See full document

50

Survey on Big Data Mining Algorithms

Survey on Big Data Mining Algorithms

... G. Data privacy issues Data privacy has been always a serious issue right from the beginning of Data mining ...with big data mining that often needs personal information in order to ... See full document

5

Efficient clustering of big data using graph method

Efficient clustering of big data using graph method

... The data mining process is to extract the information from a large data set and transform the extracted data into an understandable structure for further ...exploratory data analysis ... See full document

5

No Science No Humans, No New Technologies No changes          "Big Data a Great Revolution

No Science No Humans, No New Technologies No changes "Big Data a Great Revolution

... other Big Data systems, biometric systems contend with the “four V” challenges that involve the effective managing of the complex life cycle and operations of identity information—despite the immense ... See full document

6

Scalable Big Data Privacy Preservation in Cloud

Scalable Big Data Privacy Preservation in Cloud

... Anonymization of information can relieve protection and security concerns and consent to legitimate prerequisites. Anonymization is not immune countermeasures that trade off current anonymization systems can uncover ... See full document

6

An Efficient Framework and Techniques of Data Deduplication in Data Center

An Efficient Framework and Techniques of Data Deduplication in Data Center

... Cryptographic signatures are created for security purpose. The 160-bit value created by SHA-1 is different for each set of data. Here it breaks the data in to chunks. These chunks are either fixed or ... See full document

5

THE ROLE OF INFORMATION TECHNOLOGY ON THE GROWTH OF FIRMS: A VALUE ADDED 
ONSIDERATION

THE ROLE OF INFORMATION TECHNOLOGY ON THE GROWTH OF FIRMS: A VALUE ADDED ONSIDERATION

... in data mining various Anonymization techniques is used, one of the most common being ...converts data into an equivalence classes set with each class having a set of K- records ... See full document

6

Show all 10000 documents...