Oblivious sampling with applications to two-party k-means clustering
From MaRDI portal
(Redirected from Publication:2188971)
Oblivious sampling with applications to two-party \(k\)-means clustering
Oblivious sampling with applications to two-party \(k\)-means clustering
Recommendations
Cites work
- scientific article; zbMATH DE number 5485433 (Why is no real title available?)
- scientific article; zbMATH DE number 1942435 (Why is no real title available?)
- scientific article; zbMATH DE number 1759770 (Why is no real title available?)
- Advances in Cryptology – CRYPTO 2004
- Delayed-input non-malleable zero knowledge and multi-party coin tossing in four rounds
- Encrypted integer division and secure comparison
- Foundations of Cryptography
- Oblivious Polynomial Evaluation
- Oblivious Scalar-Product Protocols
- Optimal Size Integer Division Circuits
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Security and composition of multiparty cryptographic protocols
- The effectiveness of Lloyd-type methods for the \(k\)-means problem
- Theory of Cryptography
- Theory of Cryptography
Cited in
(6)- Efficient privacy-preserving outsourced \(k\)-means clustering on distributed data
- Unsupervised Machine Learning on encrypted data
- Homomorphically encrypted \(k\)-means on cloud-hosted servers with low client-side load
- Secure sampling with sublinear communication
- Towards a practical cluster analysis over encrypted data
- Accelerating the secure distributed computation of the mean by a Chebyshev expansion
This page was built for publication: Oblivious sampling with applications to two-party \(k\)-means clustering
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2188971)