2006
DOI: 10.1007/11766155_29
|View full text |Cite
|
Sign up to set email alerts
|

Filtering for Private Collaborative Benchmarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 32 publications
(25 citation statements)
references
References 17 publications
0
25
0
Order By: Relevance
“…So essentially we hide p − T using two random numbers ρ and ρ ′ . [17] used the same hiding technique in Yao's millionaire's protocol, which is shown to be secure when the range of ρ is big enough and one can increase the difficulty of guessing p − T by randomly using many possible distributions for choosing random numbers. It will reveal p = T only when ρ · (p − T ) − ρ ′ = 0, which occurs with an extremely low probability.…”
Section: F Security Analysis 1) Proximity Pre-filteringmentioning
confidence: 99%
“…So essentially we hide p − T using two random numbers ρ and ρ ′ . [17] used the same hiding technique in Yao's millionaire's protocol, which is shown to be secure when the range of ρ is big enough and one can increase the difficulty of guessing p − T by randomly using many possible distributions for choosing random numbers. It will reveal p = T only when ρ · (p − T ) − ρ ′ = 0, which occurs with an extremely low probability.…”
Section: F Security Analysis 1) Proximity Pre-filteringmentioning
confidence: 99%
“…Maximum computation for two parties was first presented and evaluated in [20] and the following protocol builds upon the successful experiences. The subscriber sends E common (x i ) to the service provider who maintains an encrypted (intermediate) maximum E common (max).…”
Section: Protocolsmentioning
confidence: 99%
“…Filtering outlying values before benchmarking has been considered in [20], where also the initial idea for the comparison (maximum) protocol was presented, but all communication was done in a peer-to-peer model. Although both papers are concerned with benchmarking as an application, they consider different computations than our statistics.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations