Privacy Preserving Data Mining within Anonymous Credential Systems
From MaRDI portal
Publication:3540036
DOI10.1007/978-3-540-85855-3_5zbMath1180.68151MaRDI QIDQ3540036
Aggelos Kiayias, Shouhuai Xu, Mordechai M. Yung
Publication date: 20 November 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-85855-3_5
94A60: Cryptography
68P25: Data encryption (aspects in computer science)
68M12: Network protocols
94A62: Authentication, digital signatures and secret sharing
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Securing threshold cryptosystems against chosen ciphertext attack
- Advances in cryptology -- EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2--6, 2004. Proceedings.
- How to share a secret
- Unclonable Group Identification
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Group Signatures
- A Verifiable Secret Shuffe of Homomorphic Encryptions
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Compact E-Cash
- Privacy-Preserving Set Operations
- Privacy preserving data mining