咨询与建议

限定检索结果

文献类型

  • 21 篇 期刊文献
  • 11 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 33 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 30 篇 工学
    • 28 篇 计算机科学与技术...
    • 13 篇 电气工程
    • 4 篇 信息与通信工程
    • 3 篇 软件工程
    • 1 篇 电子科学与技术(可...
  • 11 篇 理学
    • 10 篇 数学
    • 1 篇 统计学(可授理学、...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 33 篇 private computat...
  • 6 篇 private informat...
  • 6 篇 randomness
  • 3 篇 secure multi-par...
  • 3 篇 information-theo...
  • 3 篇 lower bounds
  • 2 篇 capacity
  • 2 篇 reed-solomon cod...
  • 2 篇 homomorphic encr...
  • 2 篇 secure function ...
  • 2 篇 fully homomorphi...
  • 2 篇 connectivity
  • 2 篇 encrypted comput...
  • 2 篇 private inferenc...
  • 1 篇 symmetric privat...
  • 1 篇 auditing and acc...
  • 1 篇 graph connectivi...
  • 1 篇 privacy-enhancin...
  • 1 篇 data privacy
  • 1 篇 runtime verifica...

机构

  • 3 篇 technion israel ...
  • 2 篇 univ waterloo wa...
  • 2 篇 simula uib n-500...
  • 2 篇 new jersey inst ...
  • 2 篇 univ texas dept ...
  • 1 篇 alan turing inst...
  • 1 篇 univ north texas...
  • 1 篇 bell commun res ...
  • 1 篇 med univ lubeck ...
  • 1 篇 the department o...
  • 1 篇 univ calif los a...
  • 1 篇 washington univ ...
  • 1 篇 technion haifa
  • 1 篇 univ twente dept...
  • 1 篇 acad sinica inst...
  • 1 篇 indian inst tech...
  • 1 篇 worcester polyte...
  • 1 篇 mit eecs dept 77...
  • 1 篇 univ alberta edm...
  • 1 篇 cnrs

作者

  • 3 篇 raviv netanel
  • 3 篇 kushilevitz e
  • 2 篇 jakoby andreas
  • 2 篇 gál a
  • 2 篇 obead sarah a.
  • 2 篇 duddu vasisht
  • 2 篇 rosnes eirik
  • 2 篇 liskiewicz macie...
  • 2 篇 bitar rawad
  • 2 篇 sun hua
  • 2 篇 rosén a
  • 2 篇 lin hsuan-yin
  • 2 篇 tang xiaohu
  • 2 篇 manthey bodo
  • 2 篇 zhu jinbao
  • 2 篇 blaeser markus
  • 2 篇 kliewer jorg
  • 1 篇 asokan n.
  • 1 篇 hsu tsan-sheng
  • 1 篇 gizem s. cetin

语言

  • 33 篇 英文
检索条件"主题词=Private computation"
33 条 记 录,以下是1-10 订阅
排序:
Comprehension from Chaos: Towards Informed Consent for private computation  23
Comprehension from Chaos: Towards Informed Consent for Priva...
收藏 引用
30th ACM SIGSAC Conference on Computer and Communications Security (ACM CCS)
作者: Kacsmar, Bailey Duddu, Vasisht Tilbury, Kyle Ur, Blase Kerschbaum, Florian Univ Alberta Edmonton AB Canada Univ Waterloo Waterloo ON Canada Univ Chicago Chicago IL 60637 USA
private computation, which includes techniques like multi-party computation and private query execution, holds great promise for enabling organizations to analyze data they and their partners hold while maintaining da... 详细信息
来源: 评论
Fundamental Limits of Multi-Message private computation
收藏 引用
IEEE Transactions on Communications 2025年
作者: Gholami, Ali Wan, Kai Jahani-Nezhad, Tayyebeh Sun, Hua Ji, Mingyue Caire, Giuseppe The Electrical Engineering and Computer Science Department Technische Universität Berlin Berlin10587 Germany The School of Electronic Information and Communications Huazhong University of Science and Technology Wuhan430074 China The Department of Electrical Engineering University of North Texas DentonTX76203 United States The Department of Electrical and Computer Engineering the University of Florida GainesvilleFL32611 United States
In a typical formulation of the private information retrieval (PIR) problem, a single user wishes to retrieve one out of K files from N servers without revealing the demanded file index to any server. This paper formu... 详细信息
来源: 评论
On the Communication-computation Tradeoff for Symmetric private Linear computation
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2025年 第6期71卷 4284-4305页
作者: Zhu, Jinbao Tang, Xiaohu Southwest Jiaotong Univ Informat Coding & Transmiss ICT Key Lab Sichuan Pr Chengdu 611756 Peoples R China
We consider the problem of symmetric private linear computation (SPLC) over a replicated storage system with colluding and straggler constraints. The SPLC problem allows the user to privately compute a linear combinat... 详细信息
来源: 评论
private Linear computation for Noncolluding Coded Databases
收藏 引用
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 2022年 第3期40卷 847-861页
作者: Obead, Sarah A. Lin, Hsuan-Yin Rosnes, Eirik Kliewer, Jorg New Jersey Inst Technol Helen & John C Hartmann Dept Elect & Comp Engn Newark NJ 07102 USA Simula UiB N-5006 Bergen Norway
private computation in a distributed storage system (DSS) is a generalization of the private information retrieval (PIR) problem. In such a setting, a user wishes to compute a function of f messages stored in n noncol... 详细信息
来源: 评论
Symmetric private Polynomial computation From Lagrange Encoding
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2022年 第4期68卷 2704-2718页
作者: Zhu, Jinbao Yan, Qifa Tang, Xiaohu Li, Songze Southwest Jiaotong Univ Informat Coding & Transmiss Key Lab Sichuan Prov CSNMT Int Cooperat Res Ctr Most Chengdu 611756 Peoples R China Hong Kong Univ Sci & Technol Thrust Internet Things Guangzhou 511458 Peoples R China
The problem of X-secure T-colluding symmetric private Polynomial computation (PPC) from coded storage system with B Byzantine and U unresponsive servers is studied in this paper. Specifically, a dataset consisting of ... 详细信息
来源: 评论
The Capacity of private computation
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2019年 第6期65卷 3880-3897页
作者: Sun, Hua Jafar, Syed Ali Univ North Texas Dept Elect Engn Denton TX 76203 USA Univ Calif Irvine Dept Elect Engn & Comp Sci Ctr Pervas Commun & Comp Irvine CA 92697 USA
We introduce the problem of private computation, comprised of N distributed and non-colluding servers, K independent datasets, and a user who wants to compute a function of the datasets privately, i.e., without reveal... 详细信息
来源: 评论
private Polynomial computation From Lagrange Encoding
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2020年 15卷 553-563页
作者: Raviv, Netanel Karpuk, David A. CALTECH Dept Elect Engn Pasadena CA 91125 USA Univ Los Andes Dept Matemat Bogota 111711 Colombia
private computation is a generalization of private information retrieval, in which a user is able to compute a function on a distributed dataset without revealing the identity of that function to the servers. In this ... 详细信息
来源: 评论
private Function computation
Private Function Computation
收藏 引用
IEEE International Symposium on Information Theory (ISIT)
作者: Tahmasebi, Behrooz Maddah-Ali, Mohammad Ali MIT EECS Dept 77 Massachusetts Ave Cambridge MA 02139 USA Sharif Univ Technol EE Dept Tehran Iran
In this paper, we study the problem of private function computation, where a user wants to compute a function of some inputs, using N \in \mathbb{N} servers, where the function is a private combination/composition of ... 详细信息
来源: 评论
private Polynomial Function computation for Noncolluding Coded Databases
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2022年 17卷 1800-1813页
作者: Obead, Sarah A. Lin, Hsuan-Yin Rosnes, Eirik Kliewer, Jorg New Jersey Inst Technol Helen & John C Hartmann Dept Elect & Comp Engn Newark NJ 07102 USA Simula UiB N-5006 Bergen Norway
We consider the problem of private polynomial computation (PPC) from a distributed storage system (DSS). In such setting a user wishes to compute a multivariate polynomial of degree at most g over f variables (or mess... 详细信息
来源: 评论
Towards Real-World private computations with Homomorphic Encryption: Current Solutions and Open Challenges
Towards Real-World Private Computations with Homomorphic Enc...
收藏 引用
28th European Symposium on Research in Computer Security (ESORICS)
作者: Iezzi, Michela Maple, Carsten Leonetti, Andrea Banca Italia Rome Italy Alan Turing Inst London England
There is an increasing need to share sensitive information within and beyond organisations. Protecting this information is vital for commercial and regulatory reasons. Homomorphic Encryption (HE) has come to the fore ... 详细信息
来源: 评论