Similarity coefficients play an important role in many application aspects. Recently, a privacy-preserving similarity coefficients protocol for binary data was proposed by Wong and Kim (Computers and Mathematics with Application 2012). In this paper, we show that their protocol is not secure, even in the semi-honest model, since the client can retrieve the input of the server without deviating from the protocol. Also we propose a secure similarity coefficients computation in the presence of malicious adversaries, and prove it using the standard simulation-based security definitions for secure two-party computation. We also discuss several extensions of our protocol for settling other problems. Technical tools in our protocol include zero-kn...
We introduce two new schemes for securely computing Hamming distance in the two-party setting. Our f...
We introduce covert two-party computation, a stronger notion of security than standard secure twopar...
cryptography, privacy, data mining Research in secure distributed computation, which was done as par...
International audienceIn this paper, we address the problem of computing the similarity between two ...
Computing similarity between data is a fundamental problem in information retrieval and data mining....
Similarity coefficients play an important role in many aspects. Recently,several schemes were propos...
Abstract. We show an efficient secure two-party protocol, based on Yao’s construction, which provide...
Secure computation is the computation of a function over private inputs. In the general setting, par...
In many distributed data mining settings, disclosure of theoriginal data sets is not acceptable due ...
Consider two data providers that want to contribute data to a certain learning model. Recent works h...
International audienceIn this paper, we consider the scenario in which the profile of a user is repr...
The goal of this paper is to assess the feasibility of two-party secure computation in the presence ...
In the artificial intelligence era, data-driven computation tasks, such as machine learning, have be...
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their ...
© 2017 Kim Sasha RamchenA fundamental problem in large distributed systems is how to enable parties ...
We introduce two new schemes for securely computing Hamming distance in the two-party setting. Our f...
We introduce covert two-party computation, a stronger notion of security than standard secure twopar...
cryptography, privacy, data mining Research in secure distributed computation, which was done as par...
International audienceIn this paper, we address the problem of computing the similarity between two ...
Computing similarity between data is a fundamental problem in information retrieval and data mining....
Similarity coefficients play an important role in many aspects. Recently,several schemes were propos...
Abstract. We show an efficient secure two-party protocol, based on Yao’s construction, which provide...
Secure computation is the computation of a function over private inputs. In the general setting, par...
In many distributed data mining settings, disclosure of theoriginal data sets is not acceptable due ...
Consider two data providers that want to contribute data to a certain learning model. Recent works h...
International audienceIn this paper, we consider the scenario in which the profile of a user is repr...
The goal of this paper is to assess the feasibility of two-party secure computation in the presence ...
In the artificial intelligence era, data-driven computation tasks, such as machine learning, have be...
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their ...
© 2017 Kim Sasha RamchenA fundamental problem in large distributed systems is how to enable parties ...
We introduce two new schemes for securely computing Hamming distance in the two-party setting. Our f...
We introduce covert two-party computation, a stronger notion of security than standard secure twopar...
cryptography, privacy, data mining Research in secure distributed computation, which was done as par...