2012
DOI: 10.1109/tifs.2012.2190726
|View full text |Cite
|
Sign up to set email alerts
|

Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
119
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 184 publications
(126 citation statements)
references
References 23 publications
0
119
0
Order By: Relevance
“…Amid less measure of time client ought to get more evaluated item. Documentation and Security Model: In paper [1], creator consider just the semi fair model where members are thought to be straightforward yet inquisitive. Along these lines, the protection saving convention they exhibit in this paper can be demonstrated secure in this model by utilizing existing evidences for the fundamental building pieces, which it is made out of.…”
Section: Approachesmentioning
confidence: 99%
“…Amid less measure of time client ought to get more evaluated item. Documentation and Security Model: In paper [1], creator consider just the semi fair model where members are thought to be straightforward yet inquisitive. Along these lines, the protection saving convention they exhibit in this paper can be demonstrated secure in this model by utilizing existing evidences for the fundamental building pieces, which it is made out of.…”
Section: Approachesmentioning
confidence: 99%
“…For example, two illustrative works [23,24] propose the use of homomorphic encryption as a structural element for their systems. Another system that uses randomized perturbation instead of encryption has been proposed in [25].…”
Section: Privacy-enhanced Recommender Systemsmentioning
confidence: 99%
“…For instance, medical data can have any link with patients' identification removed before being available for research. Privacy is usually obtained by applying Privacy Enhancing Technologies (PETs) [11][12][13][14]. PETs alone do not ensure transparency, again because they are not designed to address regulation requirements stating that users must be informed.…”
Section: Transparency For Security and Privacymentioning
confidence: 99%