Private multiparty sampling and approximation of vector combinations
From MaRDI portal
Publication:1014646
DOI10.1016/j.tcs.2008.12.062zbMath1172.68017MaRDI QIDQ1014646
Yuval Ishai, Martin J. Strauss, Tal Malkin, Rebecca N. Wright
Publication date: 29 April 2009
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2008.12.062
68P15: Database theory
68T05: Learning and adaptive systems in artificial intelligence
68W25: Approximation algorithms
94A62: Authentication, digital signatures and secret sharing
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Tracking join and self-join sizes in limited storage
- Probabilistic encryption
- Size-estimation framework with applications to transitive closure and reachability
- Protecting data privacy in private information retrieval schemes
- Security and composition of multiparty cryptographic protocols
- Oblivious transfer and polynomial evaluation
- Private approximation of search problems
- Secure multiparty computation of approximations
- Private information retrieval
- Stable distributions, pseudorandom generators, embeddings, and data stream computation
- Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information
- Near-optimal sparse fourier representations via sampling
- Fast, small-space algorithms for approximate histogram maintenance
- Bounded-concurrent secure multi-party computation with a dishonest majority
- Private Approximation of Clustering and Vertex Cover
- How Should We Solve Search Problems Privately?
- Foundations of Cryptography
- Private approximation of NP-hard functions
- Communication preserving protocols for secure function evaluation
- Randomized interpolation and approximation of sparse polynomials stPreliminary version
- Advances in Cryptology - EUROCRYPT 2004
- Multi-party Indirect Indexing and Applications
- Private Multiparty Sampling and Approximation of Vector Combinations
- Information Security
- Automata, Languages and Programming
- Algorithms - ESA 2003
- Theory of Cryptography
- Theory of Cryptography
- Privacy preserving data mining