{"title":"具有稻草人构造的容错保护隐私块聚合方案","authors":"Anirudha Bhaskar","doi":"10.1109/IEMCON.2018.8614832","DOIUrl":null,"url":null,"abstract":"The main objective of this paper is to allow an suspicious aggressor estimate statistics without harming individual's privacy and is resilient to user failure and compromise, and can efficiently support dynamic leaves and joins. This paper will also show the combination of cryptography and computational differential privacy. The world requires applications where an suspicious aggressor can collect information without harming user's privacy and compute aggregate stats periodically.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Fault-Tolerant Privacy-Preserving Block Aggregation Scheme With Straw-Man Construction\",\"authors\":\"Anirudha Bhaskar\",\"doi\":\"10.1109/IEMCON.2018.8614832\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The main objective of this paper is to allow an suspicious aggressor estimate statistics without harming individual's privacy and is resilient to user failure and compromise, and can efficiently support dynamic leaves and joins. This paper will also show the combination of cryptography and computational differential privacy. The world requires applications where an suspicious aggressor can collect information without harming user's privacy and compute aggregate stats periodically.\",\"PeriodicalId\":368939,\"journal\":{\"name\":\"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)\",\"volume\":\"33 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IEMCON.2018.8614832\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IEMCON.2018.8614832","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Fault-Tolerant Privacy-Preserving Block Aggregation Scheme With Straw-Man Construction
The main objective of this paper is to allow an suspicious aggressor estimate statistics without harming individual's privacy and is resilient to user failure and compromise, and can efficiently support dynamic leaves and joins. This paper will also show the combination of cryptography and computational differential privacy. The world requires applications where an suspicious aggressor can collect information without harming user's privacy and compute aggregate stats periodically.