A two-party privacy preserving set intersection protocol against malicious users in cloud computing
Set intersection is a fundamental operation in data mining and cloud computing. In this paper, a protocol is proposed to determine the intersection between two datasets while preserving the privacy of each set. Malicious participants are considered and the misbehavior of participants is prevented. O...
Ausführliche Beschreibung
Autor*in: |
Cao, Xuefei [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2017transfer abstract |
---|
Schlagwörter: |
---|
Umfang: |
5 |
---|
Übergeordnetes Werk: |
Enthalten in: The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds - Ling, Kunyue ELSEVIER, 2022, an international journal, Amsterdam |
---|---|
Übergeordnetes Werk: |
volume:54 ; year:2017 ; pages:41-45 ; extent:5 |
Links: |
---|
DOI / URN: |
10.1016/j.csi.2016.08.004 |
---|
Katalog-ID: |
ELV040478858 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | ELV040478858 | ||
003 | DE-627 | ||
005 | 20230625231931.0 | ||
007 | cr uuu---uuuuu | ||
008 | 180603s2017 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1016/j.csi.2016.08.004 |2 doi | |
028 | 5 | 2 | |a GBV00000000000089A.pica |
035 | |a (DE-627)ELV040478858 | ||
035 | |a (ELSEVIER)S0920-5489(16)30061-7 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | |a 004 | |
082 | 0 | 4 | |a 004 |q DE-600 |
082 | 0 | 4 | |a 550 |q VZ |
084 | |a 38.32 |2 bkl | ||
100 | 1 | |a Cao, Xuefei |e verfasserin |4 aut | |
245 | 1 | 0 | |a A two-party privacy preserving set intersection protocol against malicious users in cloud computing |
264 | 1 | |c 2017transfer abstract | |
300 | |a 5 | ||
336 | |a nicht spezifiziert |b zzz |2 rdacontent | ||
337 | |a nicht spezifiziert |b z |2 rdamedia | ||
338 | |a nicht spezifiziert |b zu |2 rdacarrier | ||
520 | |a Set intersection is a fundamental operation in data mining and cloud computing. In this paper, a protocol is proposed to determine the intersection between two datasets while preserving the privacy of each set. Malicious participants are considered and the misbehavior of participants is prevented. Our method is based on a combination of commutative encryption and hash-based commitments. Performance evaluation demonstrates the effectiveness of the protocol. Security discussion is given showing that the protocol provides data privacy, secure set intersection and tolerance to participants cheating. | ||
520 | |a Set intersection is a fundamental operation in data mining and cloud computing. In this paper, a protocol is proposed to determine the intersection between two datasets while preserving the privacy of each set. Malicious participants are considered and the misbehavior of participants is prevented. Our method is based on a combination of commutative encryption and hash-based commitments. Performance evaluation demonstrates the effectiveness of the protocol. Security discussion is given showing that the protocol provides data privacy, secure set intersection and tolerance to participants cheating. | ||
650 | 7 | |a Commutative encryption |2 Elsevier | |
650 | 7 | |a Malicious participants |2 Elsevier | |
650 | 7 | |a Data mining |2 Elsevier | |
650 | 7 | |a Set intersection |2 Elsevier | |
700 | 1 | |a Li, Hui |4 oth | |
700 | 1 | |a Dang, Lanjun |4 oth | |
700 | 1 | |a Lin, Yin |4 oth | |
773 | 0 | 8 | |i Enthalten in |n Elsevier Science Publ. BV (North-Holland) |a Ling, Kunyue ELSEVIER |t The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds |d 2022 |d an international journal |g Amsterdam |w (DE-627)ELV00903689X |
773 | 1 | 8 | |g volume:54 |g year:2017 |g pages:41-45 |g extent:5 |
856 | 4 | 0 | |u https://doi.org/10.1016/j.csi.2016.08.004 |3 Volltext |
912 | |a GBV_USEFLAG_U | ||
912 | |a GBV_ELV | ||
912 | |a SYSFLAG_U | ||
912 | |a SSG-OLC-PHA | ||
912 | |a SSG-OPC-GGO | ||
936 | b | k | |a 38.32 |j Geochemie |q VZ |
951 | |a AR | ||
952 | |d 54 |j 2017 |h 41-45 |g 5 | ||
953 | |2 045F |a 004 |
author_variant |
x c xc |
---|---|
matchkey_str |
caoxuefeilihuidanglanjunlinyin:2017----:toatpiayrsrigeitretopoooaantaii |
hierarchy_sort_str |
2017transfer abstract |
bklnumber |
38.32 |
publishDate |
2017 |
allfields |
10.1016/j.csi.2016.08.004 doi GBV00000000000089A.pica (DE-627)ELV040478858 (ELSEVIER)S0920-5489(16)30061-7 DE-627 ger DE-627 rakwb eng 004 004 DE-600 550 VZ 38.32 bkl Cao, Xuefei verfasserin aut A two-party privacy preserving set intersection protocol against malicious users in cloud computing 2017transfer abstract 5 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Set intersection is a fundamental operation in data mining and cloud computing. In this paper, a protocol is proposed to determine the intersection between two datasets while preserving the privacy of each set. Malicious participants are considered and the misbehavior of participants is prevented. Our method is based on a combination of commutative encryption and hash-based commitments. Performance evaluation demonstrates the effectiveness of the protocol. Security discussion is given showing that the protocol provides data privacy, secure set intersection and tolerance to participants cheating. Set intersection is a fundamental operation in data mining and cloud computing. In this paper, a protocol is proposed to determine the intersection between two datasets while preserving the privacy of each set. Malicious participants are considered and the misbehavior of participants is prevented. Our method is based on a combination of commutative encryption and hash-based commitments. Performance evaluation demonstrates the effectiveness of the protocol. Security discussion is given showing that the protocol provides data privacy, secure set intersection and tolerance to participants cheating. Commutative encryption Elsevier Malicious participants Elsevier Data mining Elsevier Set intersection Elsevier Li, Hui oth Dang, Lanjun oth Lin, Yin oth Enthalten in Elsevier Science Publ. BV (North-Holland) Ling, Kunyue ELSEVIER The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds 2022 an international journal Amsterdam (DE-627)ELV00903689X volume:54 year:2017 pages:41-45 extent:5 https://doi.org/10.1016/j.csi.2016.08.004 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA SSG-OPC-GGO 38.32 Geochemie VZ AR 54 2017 41-45 5 045F 004 |
spelling |
10.1016/j.csi.2016.08.004 doi GBV00000000000089A.pica (DE-627)ELV040478858 (ELSEVIER)S0920-5489(16)30061-7 DE-627 ger DE-627 rakwb eng 004 004 DE-600 550 VZ 38.32 bkl Cao, Xuefei verfasserin aut A two-party privacy preserving set intersection protocol against malicious users in cloud computing 2017transfer abstract 5 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Set intersection is a fundamental operation in data mining and cloud computing. In this paper, a protocol is proposed to determine the intersection between two datasets while preserving the privacy of each set. Malicious participants are considered and the misbehavior of participants is prevented. Our method is based on a combination of commutative encryption and hash-based commitments. Performance evaluation demonstrates the effectiveness of the protocol. Security discussion is given showing that the protocol provides data privacy, secure set intersection and tolerance to participants cheating. Set intersection is a fundamental operation in data mining and cloud computing. In this paper, a protocol is proposed to determine the intersection between two datasets while preserving the privacy of each set. Malicious participants are considered and the misbehavior of participants is prevented. Our method is based on a combination of commutative encryption and hash-based commitments. Performance evaluation demonstrates the effectiveness of the protocol. Security discussion is given showing that the protocol provides data privacy, secure set intersection and tolerance to participants cheating. Commutative encryption Elsevier Malicious participants Elsevier Data mining Elsevier Set intersection Elsevier Li, Hui oth Dang, Lanjun oth Lin, Yin oth Enthalten in Elsevier Science Publ. BV (North-Holland) Ling, Kunyue ELSEVIER The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds 2022 an international journal Amsterdam (DE-627)ELV00903689X volume:54 year:2017 pages:41-45 extent:5 https://doi.org/10.1016/j.csi.2016.08.004 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA SSG-OPC-GGO 38.32 Geochemie VZ AR 54 2017 41-45 5 045F 004 |
allfields_unstemmed |
10.1016/j.csi.2016.08.004 doi GBV00000000000089A.pica (DE-627)ELV040478858 (ELSEVIER)S0920-5489(16)30061-7 DE-627 ger DE-627 rakwb eng 004 004 DE-600 550 VZ 38.32 bkl Cao, Xuefei verfasserin aut A two-party privacy preserving set intersection protocol against malicious users in cloud computing 2017transfer abstract 5 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Set intersection is a fundamental operation in data mining and cloud computing. In this paper, a protocol is proposed to determine the intersection between two datasets while preserving the privacy of each set. Malicious participants are considered and the misbehavior of participants is prevented. Our method is based on a combination of commutative encryption and hash-based commitments. Performance evaluation demonstrates the effectiveness of the protocol. Security discussion is given showing that the protocol provides data privacy, secure set intersection and tolerance to participants cheating. Set intersection is a fundamental operation in data mining and cloud computing. In this paper, a protocol is proposed to determine the intersection between two datasets while preserving the privacy of each set. Malicious participants are considered and the misbehavior of participants is prevented. Our method is based on a combination of commutative encryption and hash-based commitments. Performance evaluation demonstrates the effectiveness of the protocol. Security discussion is given showing that the protocol provides data privacy, secure set intersection and tolerance to participants cheating. Commutative encryption Elsevier Malicious participants Elsevier Data mining Elsevier Set intersection Elsevier Li, Hui oth Dang, Lanjun oth Lin, Yin oth Enthalten in Elsevier Science Publ. BV (North-Holland) Ling, Kunyue ELSEVIER The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds 2022 an international journal Amsterdam (DE-627)ELV00903689X volume:54 year:2017 pages:41-45 extent:5 https://doi.org/10.1016/j.csi.2016.08.004 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA SSG-OPC-GGO 38.32 Geochemie VZ AR 54 2017 41-45 5 045F 004 |
allfieldsGer |
10.1016/j.csi.2016.08.004 doi GBV00000000000089A.pica (DE-627)ELV040478858 (ELSEVIER)S0920-5489(16)30061-7 DE-627 ger DE-627 rakwb eng 004 004 DE-600 550 VZ 38.32 bkl Cao, Xuefei verfasserin aut A two-party privacy preserving set intersection protocol against malicious users in cloud computing 2017transfer abstract 5 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Set intersection is a fundamental operation in data mining and cloud computing. In this paper, a protocol is proposed to determine the intersection between two datasets while preserving the privacy of each set. Malicious participants are considered and the misbehavior of participants is prevented. Our method is based on a combination of commutative encryption and hash-based commitments. Performance evaluation demonstrates the effectiveness of the protocol. Security discussion is given showing that the protocol provides data privacy, secure set intersection and tolerance to participants cheating. Set intersection is a fundamental operation in data mining and cloud computing. In this paper, a protocol is proposed to determine the intersection between two datasets while preserving the privacy of each set. Malicious participants are considered and the misbehavior of participants is prevented. Our method is based on a combination of commutative encryption and hash-based commitments. Performance evaluation demonstrates the effectiveness of the protocol. Security discussion is given showing that the protocol provides data privacy, secure set intersection and tolerance to participants cheating. Commutative encryption Elsevier Malicious participants Elsevier Data mining Elsevier Set intersection Elsevier Li, Hui oth Dang, Lanjun oth Lin, Yin oth Enthalten in Elsevier Science Publ. BV (North-Holland) Ling, Kunyue ELSEVIER The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds 2022 an international journal Amsterdam (DE-627)ELV00903689X volume:54 year:2017 pages:41-45 extent:5 https://doi.org/10.1016/j.csi.2016.08.004 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA SSG-OPC-GGO 38.32 Geochemie VZ AR 54 2017 41-45 5 045F 004 |
allfieldsSound |
10.1016/j.csi.2016.08.004 doi GBV00000000000089A.pica (DE-627)ELV040478858 (ELSEVIER)S0920-5489(16)30061-7 DE-627 ger DE-627 rakwb eng 004 004 DE-600 550 VZ 38.32 bkl Cao, Xuefei verfasserin aut A two-party privacy preserving set intersection protocol against malicious users in cloud computing 2017transfer abstract 5 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Set intersection is a fundamental operation in data mining and cloud computing. In this paper, a protocol is proposed to determine the intersection between two datasets while preserving the privacy of each set. Malicious participants are considered and the misbehavior of participants is prevented. Our method is based on a combination of commutative encryption and hash-based commitments. Performance evaluation demonstrates the effectiveness of the protocol. Security discussion is given showing that the protocol provides data privacy, secure set intersection and tolerance to participants cheating. Set intersection is a fundamental operation in data mining and cloud computing. In this paper, a protocol is proposed to determine the intersection between two datasets while preserving the privacy of each set. Malicious participants are considered and the misbehavior of participants is prevented. Our method is based on a combination of commutative encryption and hash-based commitments. Performance evaluation demonstrates the effectiveness of the protocol. Security discussion is given showing that the protocol provides data privacy, secure set intersection and tolerance to participants cheating. Commutative encryption Elsevier Malicious participants Elsevier Data mining Elsevier Set intersection Elsevier Li, Hui oth Dang, Lanjun oth Lin, Yin oth Enthalten in Elsevier Science Publ. BV (North-Holland) Ling, Kunyue ELSEVIER The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds 2022 an international journal Amsterdam (DE-627)ELV00903689X volume:54 year:2017 pages:41-45 extent:5 https://doi.org/10.1016/j.csi.2016.08.004 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA SSG-OPC-GGO 38.32 Geochemie VZ AR 54 2017 41-45 5 045F 004 |
language |
English |
source |
Enthalten in The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds Amsterdam volume:54 year:2017 pages:41-45 extent:5 |
sourceStr |
Enthalten in The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds Amsterdam volume:54 year:2017 pages:41-45 extent:5 |
format_phy_str_mv |
Article |
bklname |
Geochemie |
institution |
findex.gbv.de |
topic_facet |
Commutative encryption Malicious participants Data mining Set intersection |
dewey-raw |
004 |
isfreeaccess_bool |
false |
container_title |
The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds |
authorswithroles_txt_mv |
Cao, Xuefei @@aut@@ Li, Hui @@oth@@ Dang, Lanjun @@oth@@ Lin, Yin @@oth@@ |
publishDateDaySort_date |
2017-01-01T00:00:00Z |
hierarchy_top_id |
ELV00903689X |
dewey-sort |
14 |
id |
ELV040478858 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV040478858</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230625231931.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">180603s2017 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.csi.2016.08.004</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">GBV00000000000089A.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV040478858</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S0920-5489(16)30061-7</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">550</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">38.32</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cao, Xuefei</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">A two-party privacy preserving set intersection protocol against malicious users in cloud computing</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2017transfer abstract</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">5</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Set intersection is a fundamental operation in data mining and cloud computing. In this paper, a protocol is proposed to determine the intersection between two datasets while preserving the privacy of each set. Malicious participants are considered and the misbehavior of participants is prevented. Our method is based on a combination of commutative encryption and hash-based commitments. Performance evaluation demonstrates the effectiveness of the protocol. Security discussion is given showing that the protocol provides data privacy, secure set intersection and tolerance to participants cheating.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Set intersection is a fundamental operation in data mining and cloud computing. In this paper, a protocol is proposed to determine the intersection between two datasets while preserving the privacy of each set. Malicious participants are considered and the misbehavior of participants is prevented. Our method is based on a combination of commutative encryption and hash-based commitments. Performance evaluation demonstrates the effectiveness of the protocol. Security discussion is given showing that the protocol provides data privacy, secure set intersection and tolerance to participants cheating.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Commutative encryption</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Malicious participants</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data mining</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Set intersection</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Hui</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dang, Lanjun</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lin, Yin</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier Science Publ. BV (North-Holland)</subfield><subfield code="a">Ling, Kunyue ELSEVIER</subfield><subfield code="t">The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds</subfield><subfield code="d">2022</subfield><subfield code="d">an international journal</subfield><subfield code="g">Amsterdam</subfield><subfield code="w">(DE-627)ELV00903689X</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:54</subfield><subfield code="g">year:2017</subfield><subfield code="g">pages:41-45</subfield><subfield code="g">extent:5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.csi.2016.08.004</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-PHA</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OPC-GGO</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">38.32</subfield><subfield code="j">Geochemie</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">54</subfield><subfield code="j">2017</subfield><subfield code="h">41-45</subfield><subfield code="g">5</subfield></datafield><datafield tag="953" ind1=" " ind2=" "><subfield code="2">045F</subfield><subfield code="a">004</subfield></datafield></record></collection>
|
author |
Cao, Xuefei |
spellingShingle |
Cao, Xuefei ddc 004 ddc 550 bkl 38.32 Elsevier Commutative encryption Elsevier Malicious participants Elsevier Data mining Elsevier Set intersection A two-party privacy preserving set intersection protocol against malicious users in cloud computing |
authorStr |
Cao, Xuefei |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)ELV00903689X |
format |
electronic Article |
dewey-ones |
004 - Data processing & computer science 550 - Earth sciences |
delete_txt_mv |
keep |
author_role |
aut |
collection |
elsevier |
remote_str |
true |
illustrated |
Not Illustrated |
topic_title |
004 004 DE-600 550 VZ 38.32 bkl A two-party privacy preserving set intersection protocol against malicious users in cloud computing Commutative encryption Elsevier Malicious participants Elsevier Data mining Elsevier Set intersection Elsevier |
topic |
ddc 004 ddc 550 bkl 38.32 Elsevier Commutative encryption Elsevier Malicious participants Elsevier Data mining Elsevier Set intersection |
topic_unstemmed |
ddc 004 ddc 550 bkl 38.32 Elsevier Commutative encryption Elsevier Malicious participants Elsevier Data mining Elsevier Set intersection |
topic_browse |
ddc 004 ddc 550 bkl 38.32 Elsevier Commutative encryption Elsevier Malicious participants Elsevier Data mining Elsevier Set intersection |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
zu |
author2_variant |
h l hl l d ld y l yl |
hierarchy_parent_title |
The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds |
hierarchy_parent_id |
ELV00903689X |
dewey-tens |
000 - Computer science, knowledge & systems 550 - Earth sciences & geology |
hierarchy_top_title |
The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)ELV00903689X |
title |
A two-party privacy preserving set intersection protocol against malicious users in cloud computing |
ctrlnum |
(DE-627)ELV040478858 (ELSEVIER)S0920-5489(16)30061-7 |
title_full |
A two-party privacy preserving set intersection protocol against malicious users in cloud computing |
author_sort |
Cao, Xuefei |
journal |
The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds |
journalStr |
The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works 500 - Science |
recordtype |
marc |
publishDateSort |
2017 |
contenttype_str_mv |
zzz |
container_start_page |
41 |
author_browse |
Cao, Xuefei |
container_volume |
54 |
physical |
5 |
class |
004 004 DE-600 550 VZ 38.32 bkl |
format_se |
Elektronische Aufsätze |
author-letter |
Cao, Xuefei |
doi_str_mv |
10.1016/j.csi.2016.08.004 |
dewey-full |
004 550 |
title_sort |
a two-party privacy preserving set intersection protocol against malicious users in cloud computing |
title_auth |
A two-party privacy preserving set intersection protocol against malicious users in cloud computing |
abstract |
Set intersection is a fundamental operation in data mining and cloud computing. In this paper, a protocol is proposed to determine the intersection between two datasets while preserving the privacy of each set. Malicious participants are considered and the misbehavior of participants is prevented. Our method is based on a combination of commutative encryption and hash-based commitments. Performance evaluation demonstrates the effectiveness of the protocol. Security discussion is given showing that the protocol provides data privacy, secure set intersection and tolerance to participants cheating. |
abstractGer |
Set intersection is a fundamental operation in data mining and cloud computing. In this paper, a protocol is proposed to determine the intersection between two datasets while preserving the privacy of each set. Malicious participants are considered and the misbehavior of participants is prevented. Our method is based on a combination of commutative encryption and hash-based commitments. Performance evaluation demonstrates the effectiveness of the protocol. Security discussion is given showing that the protocol provides data privacy, secure set intersection and tolerance to participants cheating. |
abstract_unstemmed |
Set intersection is a fundamental operation in data mining and cloud computing. In this paper, a protocol is proposed to determine the intersection between two datasets while preserving the privacy of each set. Malicious participants are considered and the misbehavior of participants is prevented. Our method is based on a combination of commutative encryption and hash-based commitments. Performance evaluation demonstrates the effectiveness of the protocol. Security discussion is given showing that the protocol provides data privacy, secure set intersection and tolerance to participants cheating. |
collection_details |
GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA SSG-OPC-GGO |
title_short |
A two-party privacy preserving set intersection protocol against malicious users in cloud computing |
url |
https://doi.org/10.1016/j.csi.2016.08.004 |
remote_bool |
true |
author2 |
Li, Hui Dang, Lanjun Lin, Yin |
author2Str |
Li, Hui Dang, Lanjun Lin, Yin |
ppnlink |
ELV00903689X |
mediatype_str_mv |
z |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth oth oth |
doi_str |
10.1016/j.csi.2016.08.004 |
up_date |
2024-07-06T17:35:02.983Z |
_version_ |
1803851979014799360 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV040478858</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230625231931.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">180603s2017 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.csi.2016.08.004</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">GBV00000000000089A.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV040478858</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S0920-5489(16)30061-7</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">550</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">38.32</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cao, Xuefei</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">A two-party privacy preserving set intersection protocol against malicious users in cloud computing</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2017transfer abstract</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">5</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Set intersection is a fundamental operation in data mining and cloud computing. In this paper, a protocol is proposed to determine the intersection between two datasets while preserving the privacy of each set. Malicious participants are considered and the misbehavior of participants is prevented. Our method is based on a combination of commutative encryption and hash-based commitments. Performance evaluation demonstrates the effectiveness of the protocol. Security discussion is given showing that the protocol provides data privacy, secure set intersection and tolerance to participants cheating.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Set intersection is a fundamental operation in data mining and cloud computing. In this paper, a protocol is proposed to determine the intersection between two datasets while preserving the privacy of each set. Malicious participants are considered and the misbehavior of participants is prevented. Our method is based on a combination of commutative encryption and hash-based commitments. Performance evaluation demonstrates the effectiveness of the protocol. Security discussion is given showing that the protocol provides data privacy, secure set intersection and tolerance to participants cheating.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Commutative encryption</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Malicious participants</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data mining</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Set intersection</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Hui</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dang, Lanjun</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lin, Yin</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier Science Publ. BV (North-Holland)</subfield><subfield code="a">Ling, Kunyue ELSEVIER</subfield><subfield code="t">The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds</subfield><subfield code="d">2022</subfield><subfield code="d">an international journal</subfield><subfield code="g">Amsterdam</subfield><subfield code="w">(DE-627)ELV00903689X</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:54</subfield><subfield code="g">year:2017</subfield><subfield code="g">pages:41-45</subfield><subfield code="g">extent:5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.csi.2016.08.004</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-PHA</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OPC-GGO</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">38.32</subfield><subfield code="j">Geochemie</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">54</subfield><subfield code="j">2017</subfield><subfield code="h">41-45</subfield><subfield code="g">5</subfield></datafield><datafield tag="953" ind1=" " ind2=" "><subfield code="2">045F</subfield><subfield code="a">004</subfield></datafield></record></collection>
|
score |
7.3987656 |