![Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Ciphertext / Secure multi-party computation / Cryptosystem / Data anonymization / ElGamal encryption Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Ciphertext / Secure multi-party computation / Cryptosystem / Data anonymization / ElGamal encryption](https://www.pdfsearch.io/img/d1916c840b9d33067b254f50a5f70911.jpg) Date: 2007-02-22 22:55:51Cryptography Ciphertext indistinguishability Chosen-ciphertext attack Adaptive chosen-ciphertext attack Ciphertext Secure multi-party computation Cryptosystem Data anonymization ElGamal encryption | | Efficient Anonymity-Preserving Data Collection Justin Brickell and Vitaly Shmatikov Department of Computer Sciences The University of Texas at Austin Austin, TX, USAAdd to Reading ListSource URL: www.cyber-ta.orgDownload Document from Source Website File Size: 212,29 KBShare Document on Facebook
|