Privacy Preserving Data Mining within Anonymous Credential Systems
From MaRDI portal
Publication:3540036
DOI10.1007/978-3-540-85855-3_5zbMath1180.68151OpenAlexW1794287229MaRDI QIDQ3540036
Shouhuai Xu, Aggelos Kiayias, Mordechai M. Yung
Publication date: 20 November 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-85855-3_5
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Network protocols (68M12) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Securing threshold cryptosystems against chosen ciphertext attack
- Advances in cryptology -- EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2--6, 2004. Proceedings.
- How to share a secret
- Unclonable Group Identification
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Group Signatures
- A Verifiable Secret Shuffe of Homomorphic Encryptions
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Compact E-Cash
- Privacy-Preserving Set Operations
- Privacy preserving data mining