![Differential privacy / Secure multi-party computation / Cipher / Privacy / Homomorphic encryption / Internet privacy / ElGamal encryption / Cryptography / Public-key cryptography / Data privacy Differential privacy / Secure multi-party computation / Cipher / Privacy / Homomorphic encryption / Internet privacy / ElGamal encryption / Cryptography / Public-key cryptography / Data privacy](https://www.pdfsearch.io/img/cac492ef4cbfc6e489c16a11c15b32a3.jpg)
| Document Date: 2011-02-10 19:20:15 Open Document File Size: 352,65 KBShare Result on Facebook
Facility Time-Series Data Elaine Shi PARC/UC Berkeley T-H. Hubert Chan The University of Hong Kong Richard Chow PARC Abstract We / / IndustryTerm telemetry devices / noise generation algorithm / storage server / interactive multiple-party protocol / Sensor networks / large-scale cloud applications / cloud computing applications / brute-force search / cloud applications / cloud computing / naive solution / multi-party protocol / cloud services / / Organization UC Berkeley / University of Hong Kong / / Person Dawn Song / Eleanor Rieffel / / Position manager / trusted dealer / researcher / General / Private / / Technology encryption / DiffieHellman-based encryption / multi-party protocol / public key / PSA algorithms / Setup algorithm / Secure MultiParty protocol / private key / NoisyEnc algorithm / secret key / noise generation algorithm / following algorithms / El Gamal encryption / noisy encryption / /
SocialTag |