Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society 2004
DOI: 10.1145/1029179.1029203
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving data linkage protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
27
0

Year Published

2006
2006
2015
2015

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(27 citation statements)
references
References 11 publications
0
27
0
Order By: Relevance
“…Two protocols that not only enable data matching, but also allow cohort extraction, have recently been proposed [42]. Combined, they facilitate the construction of a matched data set in such a way that no identifying information is revealed to any other party involved, and neither of the data holders learns which of their records have been extracted from their databases.…”
Section: Privacy-preserving Matchingmentioning
confidence: 99%
See 1 more Smart Citation
“…Two protocols that not only enable data matching, but also allow cohort extraction, have recently been proposed [42]. Combined, they facilitate the construction of a matched data set in such a way that no identifying information is revealed to any other party involved, and neither of the data holders learns which of their records have been extracted from their databases.…”
Section: Privacy-preserving Matchingmentioning
confidence: 99%
“…This process is similar to the cohort extraction protocol discussed above [42], however, because addresses are often dirty (i.e., contain errors and variations), approximate matching techniques are required. A variation of the q-gram based three-party protocol [43] does allow such a privacy-preserving geocoding, but as discussed before, the computational and communication overheads of this approach prohibits the geocoding of large databases.…”
Section: Privacy-preserving Geocodingmentioning
confidence: 99%
“…Various solutions for millionaire's or private equality test problem have been proposed [2,18,22]. In addition, other types of multiparty computations have followed such as set intersection [5,6,8,9,13,14,20,24], set element reduction [16], and set union [3,10,15,16]. However, PPMU itself has been paid comparatively less attention though electronic voting and shuffling algorithms solve the similar problem.…”
Section: Introductionmentioning
confidence: 99%
“…These algorithms modify the initial data in order to preserve privacy while still providing usable data. However, modification to the original data needs to be performed carefully, as large modifications may lead to loss of important information, while minor changes may not be sufficient to protect privacy [7].…”
Section: Introductionmentioning
confidence: 99%