Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining 2004
DOI: 10.1145/1014052.1014145
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving Bayesian network structure computation on distributed heterogeneous data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
122
0
1

Year Published

2005
2005
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 179 publications
(123 citation statements)
references
References 14 publications
0
122
0
1
Order By: Relevance
“…This line of research uses secure multi-party computation (SMC) protocols to protect private information [17,18]. What is not addressed by SMC studies is how much private information is actually disclosed by the computation results.…”
Section: Related Workmentioning
confidence: 99%
“…This line of research uses secure multi-party computation (SMC) protocols to protect private information [17,18]. What is not addressed by SMC studies is how much private information is actually disclosed by the computation results.…”
Section: Related Workmentioning
confidence: 99%
“…The work most related to ours is [12], where Wright and Yang applied homomorphic encryption [10] to the Bayesian networks induction for the case of two parties. However, the core protocol which is called Scalar Product Protocol can be easily attacked.…”
Section: Privacy-preserving Data Miningmentioning
confidence: 99%
“…In this paper, we develop a secure two-party protocol and a secure multi-party protocol based on homomorphic encryption. Our contribution not only overcomes the attacks which exist in [12], but more importantly, a general secure protocol involving multiple parties is provided.…”
Section: Privacy-preserving Data Miningmentioning
confidence: 99%
See 1 more Smart Citation
“…However, cryptographic methods may restrict data access and exchange too much. Furthermore, cryptographic privacy-preserving methods [15,22,24] usually tailor some specific data mining tasks, and therefore lose generality.…”
Section: Introductionmentioning
confidence: 99%