TY - JOUR
T1 - Secure multiparty computation for privacy-preserving data mining
AU - Lindell, Y.
AU - Pinkas, B.
PY - 2009
Y1 - 2009
N2 - In this paper, we survey the basic paradigms and notions of secure multiparty
computation and discuss their relevance to the field of privacy-preserving
data mining. In addition to reviewing definitions and constructions for secure multiparty
computation, we discuss the issue of efficiency and demonstrate the difficulties
involved in constructing highly efficient protocols. We also present common
errors that are prevalent in the literature when secure multiparty computation
techniques are applied to privacy-preserving data mining. Finally, we discuss the
relationship between secure multiparty computation and privacy-preserving data
mining, and show which problems it solves and which problems it does not.
AB - In this paper, we survey the basic paradigms and notions of secure multiparty
computation and discuss their relevance to the field of privacy-preserving
data mining. In addition to reviewing definitions and constructions for secure multiparty
computation, we discuss the issue of efficiency and demonstrate the difficulties
involved in constructing highly efficient protocols. We also present common
errors that are prevalent in the literature when secure multiparty computation
techniques are applied to privacy-preserving data mining. Finally, we discuss the
relationship between secure multiparty computation and privacy-preserving data
mining, and show which problems it solves and which problems it does not.
UR - http://repository.cmu.edu/cgi/viewcontent.cgi?article=1004&context=jpc
M3 - Article
VL - 1
SP - 59
EP - 98
JO - Journal of Privacy and Confidentiality
JF - Journal of Privacy and Confidentiality
IS - 1
ER -