Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
نویسندگان
چکیده
منابع مشابه
Privacy Preserving k Secure Sum Protocol
Secure Multiparty Computation (SMC) allows parties to know the result of cooperative computation while preserving privacy of individual data. Secure sum computation is an important application of SMC. In our proposed protocols parties are allowed to compute the sum while keeping their individual data secret with increased computation complexity for hacking individual data. In this paper the dat...
متن کاملPrivacy Preserving and Collusion Resistant Energy Sharing
Energy has been increasingly generated or collected by different entities on the power grid (e.g., universities, hospitals and householdes) via solar panels, wind turbines or local generators in the past decade. With local energy, such electricity consumers can be considered as “microgrids” which can simulataneously generate and consume energy. Some microgrids may have excessive energy that can...
متن کاملCollusion-Free Privacy Preserving Data Mining
Distributed association rule mining is an integral part of data mining that extracts useful information hidden in distributed data sources. As local frequent itemsets are globalized from data sources, sensitive information about individual data sources needs high protection. Different privacy preserving data mining approaches for distributed environment have been proposed but in the existing ap...
متن کاملCollusion-Free Privacy Preserving Data Mining
Distributed association rule mining is an integral part of data mining that extracts useful information hidden in distributed data sources. As local frequent itemsets are globalized from data sources, sensitive information about individual data sources needs high protection. Different privacy preserving data mining approaches for distributed environment have been proposed but in the existing ap...
متن کاملSecure and Privacy-Preserving Consensus
Consensus is fundamental for distributed systems since it underpins key functionalities of such systems ranging from distributed information fusion, decision-making, to decentralized control. In order to reach an agreement, existing consensus algorithms require each agent to exchange explicit state information with its neighbors. This leads to the disclosure of private state information, which ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2015
ISSN: 1545-5971
DOI: 10.1109/tdsc.2014.2309134