Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society 2004
DOI: 10.1145/1029179.1029204
|View full text |Cite
|
Sign up to set email alerts
|

Private collaborative forecasting and benchmarking

Abstract: Suppose a number of hospitals in a geographic area want to learn how their own heart-surgery unit is doing compared with the others in terms of mortality rates, subsequent complications, or any other quality metric. Similarly, a number of small businesses might want to use their recent point-of-sales data to cooperatively forecast future demand and thus make more informed decisions about inventory, capacity, employment, etc. These are simple examples of cooperative benchmarking and (respectively) forecasting t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
87
0
1

Year Published

2006
2006
2014
2014

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 112 publications
(88 citation statements)
references
References 19 publications
0
87
0
1
Order By: Relevance
“…Proofs for the protocols using homomorphic encryption can be found in [1,17,27]. For security of the mixed protocol we refer to Goldreich's composition theorem [18].…”
Section: Securitymentioning
confidence: 99%
See 2 more Smart Citations
“…Proofs for the protocols using homomorphic encryption can be found in [1,17,27]. For security of the mixed protocol we refer to Goldreich's composition theorem [18].…”
Section: Securitymentioning
confidence: 99%
“…The intermediate language currently supports the following operations for which secure protocols are given in [1,17,27,33]. Some of these operations leverage the specific advantages of the respective protocol type, i.e., direct access to single bits and shift operations for garbled circuits or arithmetic operations for homomorphic encryption:…”
Section: Layersmentioning
confidence: 99%
See 1 more Smart Citation
“…The application of private collaborative benchmarking has been first described in [2]. The authors present important applications of a secure division protocol, where one party performs the blinded division after the others have agreed on the blinding.…”
Section: Related Workmentioning
confidence: 99%
“…Companies are reluctant to share their business performance data due to the risk of losing a competitive advantage or being embarrassed. Several privacy-preserving protocols that can be used for benchmarking that keep the KPIs confidential within one company have been proposed in the literature [2,5,9,10,13,20]. None of those matches the requirements of a large service provider offering a benchmarking service entirely.…”
Section: Introductionmentioning
confidence: 99%