339,980 Hits in 2.3 sec

Improved Efficiency for Private Stable Matching [chapter]

Matthew Franklin, Mark Gondree, Payman Mohassel
2006 Lecture Notes in Computer Science  
At Financial Crypto 2006, Golle presented a novel framework for the privacy preserving computation of a stable matching (stable marriage).  ...  protocols with poly-log communication complexity for computing this function, either of which are adaptable to our setting.  ...  These matching authorities execute a synchronous protocol among themselves to compute the stable matching.  ... 
doi:10.1007/11967668_11 fatcat:zwc6swgrerfklj3shaajz5ewce

Private Record Linkage: Comparison of Selected Techniques for Name Matching [chapter]

Pawel Grzebala, Michelle Cheatham
2016 Lecture Notes in Computer Science  
Efficient and accurate private record linkage algorithms are necessary to achieve this.  ...  Zbigniew for their continuous support during my years of study at Wright State University.  ...  Michelle Cheatham, for her invaluable and persistent guidance throughout the duration of this project. I would also like to thank Dr. Chen and Dr. Krishnaprasad for serving on my thesis committee.  ... 
doi:10.1007/978-3-319-34129-3_36 fatcat:qenuxqsdofdrbjyl6a3333nbaa

Fine-grained private matching for proximity-based mobile social networking

Rui Zhang, Yanchao Zhang, Jinyuan Sun, Guanhua Yan
2012 2012 Proceedings IEEE INFOCOM  
In contrast to existing coarsegrained private matching schemes for PMSN, our protocols allow finer differentiation between PMSN users and can support a wide range of matching metrics at different privacy  ...  This paper tackles this open challenge by designing a suite of novel fine-grained private matching protocols.  ...  We would also like to thank anonymous reviewers for their constructive comments and helpful advice.  ... 
doi:10.1109/infcom.2012.6195574 dblp:conf/infocom/ZhangZSY12 fatcat:w2gngvbw2nehxbt4yglnqsw6pe

Privacy-Aware Genome Mining: Server-Assisted Protocols for Private Set Intersection and Pattern Matching

Constantinos Patsakis, Athanasios Zigomitros, Agusti Solanas
2015 2015 IEEE 28th International Symposium on Computer-Based Medical Systems  
We describe how to solve the private set intersection problem and a set of pattern matching queries with privacy.  ...  The sequence of base pairs accounts for approximately 3 billion elements.  ...  Finally, we report the average times required to execute our private pattern matching and our private sub-sequence matching protocols for different lengths of DNA sequences.  ... 
doi:10.1109/cbms.2015.70 dblp:conf/cbms/PatsakisZS15 fatcat:rkftmmmsunhs5mqiuybvx7qzam

Enabling a Secure Match over Private Image Collections

Ayad Abdulsada, Hesham Ridha, Abdul-Kareem Hameed, Younis, Ibrahim Ayad, Hesham Abdulsada, Ridha Saleh, Abdul-Kareem Hameed, Younis
2016 Journal of Kufa for Mathematics and Computer   unpublished
Image matching techniques play an essential role in many real world applications such as content based image retrieval (CBIR), computer vision, and near duplicate images.  ...  The state of the art methods are generally assumed that the content of images is not private.  ...  Bob computes the encrypted dot products for every image in his private collection and sends them to Alice. For each encrypted dot product , Alice decrypts it to get the actual dot product.  ... 

Private Fingerprint Matching [chapter]

Siamak F. Shahandashti, Reihaneh Safavi-Naini, Philip Ogunbona
2012 Lecture Notes in Computer Science  
We propose a fully private fingerprint matching protocol that compares two fingerprints based on the most widely-used minutia-based fingerprint matching algorithm.  ...  Unlike previous works, we do not make any simplifying assumption on the matching algorithm or use generic multiparty computation protocols in our constructions.  ...  Acknowledgement The first author would like to thank Josef Pieprzyk and Macquarie University for hosting him during part of this research.  ... 
doi:10.1007/978-3-642-31448-3_32 fatcat:pv33bnlnt5em7frmvxgqorq2ke

Gmatch: Secure and privacy-preserving group matching in social networks

Boyang Wang, Baochun Li, Hui Li
2012 2012 IEEE Global Communications Conference (GLOBECOM)  
In this paper, we present a new group matching mechanism, by taking advantage private set intersection and ring signatures.  ...  However, in many cases, attributes of both group members and the stranger need to be kept private and should not be revealed to others, as they may contain sensitive and personal information.  ...  ACKNOWLEDGEMENT We are grateful to the anonymous reviewers for their helpful comments. This work is supported by the National Science and Technology Major Project  ... 
doi:10.1109/glocom.2012.6503199 dblp:conf/globecom/WangLL12 fatcat:klozytp6w5g7bfbhxdhedczvpi

Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking

Rui Zhang, Jinxue Zhang, Yanchao Zhang, Jinyuan Sun, Guanhua Yan
2013 IEEE Journal on Selected Areas in Communications  
In contrast to existing coarsegrained private matching schemes for PMSN, our protocols allow finer differentiation between PMSN users and can support a wide range of matching metrics at different privacy  ...  This paper tackles this open challenge by designing novel fine-grained private matching protocols.  ...  Private matching for PMSN can also be viewed as special instances of secure multi-party computation [20] .  ... 
doi:10.1109/jsac.2013.sup.0513057 fatcat:3prpbxv3nja7dhk4h6axehg4ae

Broker-Based Private Matching [chapter]

Abdullatif Shikfa, Melek Önen, Refik Molva
2011 Lecture Notes in Computer Science  
We propose a new concept involving an intermediate entity in the private matching process: we consider the problem of broker-based private matching where end-entities do not interact with each other but  ...  Private matching solutions allow two parties to find common data elements over their own datasets without revealing any additional private information.  ...  They also study some variants of private matching, among which the private cardinality matching, which is very close to our matching ratio computation.  ... 
doi:10.1007/978-3-642-22263-4_15 fatcat:xtrzzr3jyjfefjuvadpkbohb54

Private searching for single and conjunctive keywords on streaming data

Xun Yi, Elisa Bertino
2011 Proceedings of the 10th annual ACM workshop on Privacy in the electronic society - WPES '11  
Current solutions for private searching on streaming data only support searching for "OR" of keywords or "AND" of two sets of keywords.  ...  In this paper, we extend the types of private queries to support searching on streaming data for an "  ...  If 1 ∩ & ≠ ∅, then the matching file can be retrieved by computing 1 = $ >? @ 8 $ >? A 8 , where B stands for decryption with the private key + .  ... 
doi:10.1145/2046556.2046577 dblp:conf/wpes/YiB11 fatcat:olyphtlgsba5hparfllhajtzke

Private Fingerprint Verification without Local Storage [chapter]

Florian Kerschbaum, Mikhail J. Atallah, David M'Raïhi, John R. Rice
2004 Lecture Notes in Computer Science  
We extend this to private verification where the verifier does not obtain fingerprint information.  ...  First, we review literature combining cryptography and biometrics, second, fingerprint matching algorithms and third, secure multi-party protocols.  ...  [5] studies approximate matching for databases access. [6] examines the security of privately computing approximations.  ... 
doi:10.1007/978-3-540-25948-0_54 fatcat:xkcxalimfvgi3jjd7omalpljiy

Privately computing set-maximal matches in genomic data

Katerina Sotiraki, Esha Ghosh, Hao Chen
2020 BMC Medical Genomics  
We enrich this research area by proposing a privacy-preserving protocol for set-maximal matches.  ...  We design a new depth-optimized algorithm for computing set-maximal matches between a database of aligned genetic sequences and the DNA of an individual while respecting the privacy of both the database  ...  Acknowledgements The authors would like to thank the iDASH workshop organizers and the reviewers for the helpful comments.  ... 
doi:10.1186/s12920-020-0718-x pmid:32693838 fatcat:3igxxy6fqjamxigkei2wn2rphi

Efficient Information Retrieval System for Cloud Environments

Jyothi T
2017 IJARCCE  
Cloud computing as an emerging technology trend is expected to reshape the advances in information technology.  ...  In EIRQ, queries are classified into multiple ranks, where a higher ranked query can retrieve a higher percentage of matched files.  ...  New constructions and practical applications for private stream searching (2013).A system for private stream searching allows a client to retrieve documents matching some search criteria from a remote  ... 
doi:10.17148/ijarcce.2017.6459 fatcat:7strf4dgbbc3vavxqi776peywa

Privacy-preserving Attribute Matchmaking in Proximity-based Mobile Social Networks

Solomon Sarpong, Chunxiang Xu
2015 International Journal of Security and Its Applications  
In our proposed protocol, an initiator of matchmaking sets a threshold number of common attributes that an individual should have to qualify as a matching-pair.  ...  The major impediments that mostly arise in matchmaking in mobile social networks are ensuring the privacy of users' attributes, finding the intersection of attributes of the matched-pair without revealing  ...  Matchmaking protocol is a private set intersection problem where a matching-pair is made by computing the intersection of their individual attributes.  ... 
doi:10.14257/ijsia.2015.9.5.22 fatcat:uhohipwixvghxm7vwslccxzgse

Oblivious Image Matching [chapter]

Shai Avidan, Ariel Elbaz, Tal Malkin, Ryan Moriarty
2009 Protecting Privacy in Video Surveillance  
In this paper we study the private version of the problem, oblivious image matching, and provide an efficient protocol for it.  ...  Specifically, we first show how to reduce the image matching problem to a two-level version of the fuzzy set matching problem, and then present a novel protocol to privately compute this (and several other  ...  We devise private and efficient protocols for oblivious image matching in the semi-honest model, by providing protocols for the matching problem described above (along the way providing private protocols  ... 
doi:10.1007/978-1-84882-301-3_4 fatcat:ulut3dilrfhkhklrflpapiyhzm
« Previous Showing results 1 — 15 out of 339,980 results