{"entities":{"Q381129":{"pageid":382896,"ns":120,"title":"Item:Q381129","lastrevid":61405968,"modified":"2026-04-10T23:09:48Z","type":"item","id":"Q381129","labels":{"en":{"language":"en","value":"Secure computation of functionalities based on Hamming distance and its application to computing document similarity"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 6227470"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q381129$138DC511-80A5-4D54-86DE-8DEE17447A91","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"1ec47d4f640699a04064b0346e3c9734e362ebaa","datavalue":{"value":{"text":"Secure computation of functionalities based on Hamming distance and its application to computing document similarity","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q381129$69FEC65E-4C33-4215-AD01-B5E3FC3A5778","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"e08ce4b5a90c836c8ad627b1099a1e777834f53d","datavalue":{"value":"1307.94086","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q381129$7418F800-1847-45AC-B83F-4168BD740E39","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"bf750c8bef1e40d28ebf648574ad5cf20184c994","datavalue":{"value":"10.1504/IJACT.2013.053433","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q381129$39E5BFF2-16E2-4728-8EF8-A6D3B8BCC59B","rank":"normal"}],"P16":[{"mainsnak":{"snaktype":"value","property":"P16","hash":"bd216f2f355ccfe8ef450a159ea9fb11e70d3dbe","datavalue":{"value":{"entity-type":"item","numeric-id":244225,"id":"Q244225"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q381129$5C12B58C-F12A-4C9C-A591-32DC72F311B5","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"23de8c00f05643bc77a2ede4b5b78de92c3b7bc6","datavalue":{"value":{"entity-type":"item","numeric-id":381128,"id":"Q381128"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q381129$16607954-6DB7-4754-B7FB-6506377404E1","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"4f1dd5f1804b0765cf93ccdc0e7fe72ed510dc10","datavalue":{"value":{"entity-type":"item","numeric-id":244654,"id":"Q244654"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q381129$1EB385E3-759B-4460-A96A-BBCD0138890B","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"2325ba80a0443eb1d2efbd4fc822e946e68f4a27","datavalue":{"value":{"time":"+2013-11-15T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q381129$A879EC5E-F703-44A1-AF91-17216F34E398","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"f6d93ccee667fa605c36913446403331a64767e4","datavalue":{"value":"Summary: This paper examines secure two-party computation of functions, which depend only on the Hamming distance of the inputs of the two parties. We present efficient protocols for computing these functions. In particular, we present protocols which are secure in the sense of full simulatability against malicious adversaries. We then show applications of HDOT. These include protocols for checking similarity between documents without disclosing additional information about them (these protocols are based on algorithms of Broder et al. for computing document similarity based on the Jaccard measure). Another application is a variant of symmetric private information retrieval (SPIR), which can be used if the server's database contains \\(N\\) entries, at most \\(N / \\log N\\) of which have individual values, and the rest are set to some default value. The receiver does not learn whether it receives an individual value or the default value. This variant of PIR is unique since it can be based on the existence of OT alone.","type":"string"},"datatype":"string"},"type":"statement","id":"Q381129$DC673D4E-5B85-45FF-A051-B57602DF2493","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"b3f5570531d36cdad95fcc8cba24a2dabc5fbbbf","datavalue":{"value":"94A60","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q381129$4E3F7D62-BD44-4244-838B-C9DB644EEBC5","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"d5bbbabac905cffcb91871c2bc17229cc240f235","datavalue":{"value":"6227470","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q381129$4F2B54FA-083F-4FF9-B48C-E607B6C49DAE","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"c4e114e83c4b03b4c8e7e50bde437fc4e0152e28","datavalue":{"value":"secure two-party computation","type":"string"},"datatype":"string"},"type":"statement","id":"Q381129$3569A026-FF93-49B1-8D76-23AEC297308D","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"d155b5bfc7acc6a355bd294806e557876877b89d","datavalue":{"value":"document similarity","type":"string"},"datatype":"string"},"type":"statement","id":"Q381129$6D523A73-6008-4F45-ACE3-397E6B82F39C","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"c7e507470f9b21b1d2b7c7e2c1808bd7d3af3f83","datavalue":{"value":"Hamming distance","type":"string"},"datatype":"string"},"type":"statement","id":"Q381129$D6197215-6168-4698-9F8F-039C95FCCAFF","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"3d7d8bf152556412a351d7719520dc298d0c5715","datavalue":{"value":"HDOT","type":"string"},"datatype":"string"},"type":"statement","id":"Q381129$4E9C27E7-4D82-4A3B-A284-FA2D76667827","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"9d6b8267793e5b1a190fbcf0716dd277113bf713","datavalue":{"value":"symmetric private information retrieval","type":"string"},"datatype":"string"},"type":"statement","id":"Q381129$A6E73DB3-E8AA-4902-9199-AC95CAA89289","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"39c530fbce7b72c0157fd485226f237e86505fb3","datavalue":{"value":"SPIR","type":"string"},"datatype":"string"},"type":"statement","id":"Q381129$A3594FF7-4177-4070-B338-EF18B582CAA5","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"95145f9861f9d642945fd75a4cf3e1831dbd4402","datavalue":{"value":"protocol security","type":"string"},"datatype":"string"},"type":"statement","id":"Q381129$45750706-06FC-45FA-8267-F6B63A3DE967","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"166b17c54ab41178c031686e8804ef554b505a0e","datavalue":{"value":"oblivious transfer protocols","type":"string"},"datatype":"string"},"type":"statement","id":"Q381129$D0066390-1805-47A5-AD5B-7BB0D11764B6","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q381129$B3F551E0-C872-4CFB-B138-EC6E42D14D91","rank":"normal"}],"P1643":[{"mainsnak":{"snaktype":"value","property":"P1643","hash":"7446a9f5cc16902ab15baeb783e4e507ad24010c","datavalue":{"value":{"entity-type":"item","numeric-id":2170070,"id":"Q2170070"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"51033bf2b4346c2a1b42a535ca95ddd591462ab1","datavalue":{"value":{"amount":"+0.82915837","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"ac3c626774dcd0d16f89557f66586245841a01db","datavalue":{"value":{"entity-type":"item","numeric-id":6767936,"id":"Q6767936"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q381129$932F33A5-791E-425A-B564-1F643AC7DD99","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"6df5e181daf6aa3c2f92afe4f507c498ae3286ed","datavalue":{"value":{"entity-type":"item","numeric-id":2056796,"id":"Q2056796"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"1d474da3632bda10e5e5f750d31ace0a9eac8d67","datavalue":{"value":{"amount":"+0.8261643","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"ac3c626774dcd0d16f89557f66586245841a01db","datavalue":{"value":{"entity-type":"item","numeric-id":6767936,"id":"Q6767936"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q381129$9289B0F7-4470-4191-93E8-F7D5B2240BC7","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"eef6c0b11df68dbc163f6364cf302893a4edb022","datavalue":{"value":{"entity-type":"item","numeric-id":4672912,"id":"Q4672912"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"af761a8c0fc1c9ab73f02b83c923350aa247bb67","datavalue":{"value":{"amount":"+0.82240355","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"ac3c626774dcd0d16f89557f66586245841a01db","datavalue":{"value":{"entity-type":"item","numeric-id":6767936,"id":"Q6767936"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q381129$418D81DF-DA33-411C-AD00-B15C89561002","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"30f1b21293a414aa2a46fd5690076f672368afe6","datavalue":{"value":{"entity-type":"item","numeric-id":669868,"id":"Q669868"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"9c8a951760e3181cb83296bb46430be98f238d8c","datavalue":{"value":{"amount":"+0.82180226","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"ac3c626774dcd0d16f89557f66586245841a01db","datavalue":{"value":{"entity-type":"item","numeric-id":6767936,"id":"Q6767936"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q381129$B54A10E5-A295-4B33-BA1B-DB0E0A289D75","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"8e72248fb33c1aaf661b2161a3288a6b64446d0e","datavalue":{"value":{"entity-type":"item","numeric-id":4627324,"id":"Q4627324"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"707f949648bdfab226d6c1098ac4f1753c47f415","datavalue":{"value":{"amount":"+0.81485033","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"ac3c626774dcd0d16f89557f66586245841a01db","datavalue":{"value":{"entity-type":"item","numeric-id":6767936,"id":"Q6767936"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q381129$D5B2B0F8-02DE-4FD9-91C8-D801FEFB1536","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Secure computation of functionalities based on Hamming distance and its application to computing document similarity","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Secure_computation_of_functionalities_based_on_Hamming_distance_and_its_application_to_computing_document_similarity"}}}}}