KR20160041028A - 프라이버시 보호 행렬 분해를 위한 방법 및 시스템 - Google Patents
프라이버시 보호 행렬 분해를 위한 방법 및 시스템 Download PDFInfo
- Publication number
- KR20160041028A KR20160041028A KR1020157023839A KR20157023839A KR20160041028A KR 20160041028 A KR20160041028 A KR 20160041028A KR 1020157023839 A KR1020157023839 A KR 1020157023839A KR 20157023839 A KR20157023839 A KR 20157023839A KR 20160041028 A KR20160041028 A KR 20160041028A
- Authority
- KR
- South Korea
- Prior art keywords
- records
- csp
- recsys
- processor
- item
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/16—Matrix or vector computation, e.g. matrix-matrix or matrix-vector multiplication, matrix factorization
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
- H04L2209/046—Masking or blinding of operations, operands or results of the operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/46—Secure multiparty computation, e.g. millionaire problem
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/50—Oblivious transfer
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Computational Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Storage Device Security (AREA)
- Pure & Applied Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Algebra (AREA)
Applications Claiming Priority (11)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201361864094P | 2013-08-09 | 2013-08-09 | |
US201361864088P | 2013-08-09 | 2013-08-09 | |
US201361864098P | 2013-08-09 | 2013-08-09 | |
US201361864085P | 2013-08-09 | 2013-08-09 | |
US61/864,098 | 2013-08-09 | ||
US61/864,094 | 2013-08-09 | ||
US61/864,088 | 2013-08-09 | ||
US61/864,085 | 2013-08-09 | ||
USPCT/US2013/076353 | 2013-12-19 | ||
PCT/US2013/076353 WO2014137449A2 (en) | 2013-03-04 | 2013-12-19 | A method and system for privacy preserving counting |
PCT/US2014/036357 WO2014138752A2 (en) | 2013-03-04 | 2014-05-01 | A method and system for privacy preserving matrix factorization |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20160041028A true KR20160041028A (ko) | 2016-04-15 |
Family
ID=49955504
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020157023839A KR20160041028A (ko) | 2013-08-09 | 2014-05-01 | 프라이버시 보호 행렬 분해를 위한 방법 및 시스템 |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP3031165A2 (zh) |
JP (3) | JP2016510912A (zh) |
KR (1) | KR20160041028A (zh) |
CN (3) | CN105144625A (zh) |
Families Citing this family (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10452802B2 (en) * | 2016-07-08 | 2019-10-22 | efabless corporation | Methods for engineering integrated circuit design and development |
EP3319001A1 (en) * | 2016-11-02 | 2018-05-09 | Skeyecode | Method for securely transmitting a secret data to a user of a terminal |
CN106548207B (zh) * | 2016-11-03 | 2018-11-30 | 北京图森未来科技有限公司 | 一种基于神经网络的图像处理方法及装置 |
CN107135061B (zh) * | 2017-04-17 | 2019-10-22 | 北京科技大学 | 一种5g通信标准下的分布式隐私保护机器学习方法 |
CN107302498B (zh) * | 2017-06-21 | 2019-08-27 | 安徽大学 | 一种SDN网络中支持隐私保护的多域QoS路径计算方法 |
US10972263B2 (en) * | 2017-08-31 | 2021-04-06 | Visa International Service Association | Single node multi-party encryption |
JP6759168B2 (ja) * | 2017-09-11 | 2020-09-23 | 日本電信電話株式会社 | 難読化回路生成装置、難読化回路計算装置、難読化回路生成方法、難読化回路計算方法、プログラム |
CN109756442B (zh) * | 2017-11-01 | 2020-04-24 | 清华大学 | 基于混淆电路的数据统计方法、装置以及设备 |
WO2019126044A1 (en) * | 2017-12-18 | 2019-06-27 | University Of Central Florida Research Foundation, Inc. | Techniques for securely executing code that operates on encrypted data on a public computer |
US10409889B2 (en) * | 2017-12-18 | 2019-09-10 | Mythic, Inc. | Systems and methods for mapping matrix calculations to a matrix multiply accelerator |
CN110909356B (zh) | 2018-09-18 | 2022-02-01 | 百度在线网络技术(北京)有限公司 | 安全多方计算方法、装置、设备及计算机可读介质 |
WO2020100118A1 (en) | 2018-11-15 | 2020-05-22 | Ravel Technologies SARL | Cryptographic anonymization for zero-knowledge advertising methods, apparatus, and system |
CN109992979B (zh) * | 2019-03-15 | 2020-12-11 | 暨南大学 | 一种岭回归训练方法、计算设备、介质 |
CN110209994B (zh) * | 2019-04-25 | 2022-12-23 | 广西师范大学 | 基于同态加密的矩阵分解推荐方法 |
CN110086717B (zh) * | 2019-04-30 | 2021-06-22 | 创新先进技术有限公司 | 用于进行数据安全匹配的方法、装置和系统 |
CN110196944B (zh) * | 2019-05-07 | 2021-06-01 | 深圳前海微众银行股份有限公司 | 一种序列化信息的推荐方法及装置 |
CN110363000B (zh) * | 2019-07-10 | 2023-11-17 | 深圳市腾讯网域计算机网络有限公司 | 识别恶意文件的方法、装置、电子设备及存储介质 |
CN110795631B (zh) * | 2019-10-29 | 2022-09-06 | 支付宝(杭州)信息技术有限公司 | 一种基于因子分解机的推送模型优化、预测方法和装置 |
CN110990871B (zh) * | 2019-11-29 | 2023-04-07 | 腾讯云计算(北京)有限责任公司 | 基于人工智能的机器学习模型训练方法、预测方法及装置 |
CN111125517B (zh) * | 2019-12-06 | 2023-03-14 | 陕西师范大学 | 一种基于差分隐私和时间感知的隐式矩阵分解推荐方法 |
CN111259260B (zh) * | 2020-03-30 | 2023-06-02 | 九江学院 | 一种基于排序分类的个性化推荐中的隐私保护方法 |
CN111552852B (zh) * | 2020-04-27 | 2021-09-28 | 北京交通大学 | 基于半离散矩阵分解的物品推荐方法 |
CN111553126B (zh) * | 2020-05-08 | 2022-05-24 | 北京华大九天科技股份有限公司 | 一种基于机器学习训练模型获取矩阵分解时间的方法 |
CN111857649B (zh) * | 2020-06-22 | 2022-04-12 | 复旦大学 | 一种用于隐私保护机器学习的定点数编码及运算系统 |
CN114450919B (zh) * | 2020-08-14 | 2023-12-19 | 谷歌有限责任公司 | 在线隐私保护方法和系统 |
CN112528303B (zh) * | 2020-12-11 | 2024-01-26 | 重庆交通大学 | 一种基于ntru加密算法的多用户隐私推荐方法 |
IL279406B1 (en) * | 2020-12-13 | 2024-09-01 | Google Llc | Privacy-preserving techniques for selecting and sharing content |
CN112311546B (zh) * | 2020-12-25 | 2021-04-09 | 鹏城实验室 | 数据保密判定方法、装置、设备及计算机可读存储介质 |
IL280056A (en) * | 2021-01-10 | 2022-08-01 | Google Llc | Using secure mpc and vector computations to protect access to information in content distribution |
US11113707B1 (en) | 2021-01-22 | 2021-09-07 | Isolation Network, Inc. | Artificial intelligence identification of high-value audiences for marketing campaigns |
IL281328A (en) | 2021-03-08 | 2022-10-01 | Google Llc | Flexible content selection processes through multi-sided secure calculation |
CN113051587B (zh) * | 2021-03-10 | 2024-02-02 | 中国人民大学 | 一种隐私保护智能交易推荐方法、系统和可读介质 |
WO2022216293A1 (en) * | 2021-04-09 | 2022-10-13 | Google Llc | Processing of machine learning modeling data to improve accuracy of categorization |
IL283674B2 (en) | 2021-06-03 | 2024-09-01 | Google Llc | Distribution and monitoring of cross-disciplinary experimental groups to maintain privacy |
EP4099609A1 (en) * | 2021-06-04 | 2022-12-07 | Zama SAS | Computational network conversion for fully homomorphic evaluation |
CN113779500B (zh) * | 2021-08-23 | 2024-01-30 | 华控清交信息科技(北京)有限公司 | 一种数据处理方法、装置和用于数据处理的装置 |
CN114564742B (zh) * | 2022-02-18 | 2024-05-14 | 北京交通大学 | 一种基于哈希学习的轻量化联邦推荐方法 |
CN114817999B (zh) * | 2022-06-28 | 2022-09-02 | 北京金睛云华科技有限公司 | 一种基于多密钥同态加密的外包隐私保护方法和设备 |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1864171A (zh) * | 2003-08-08 | 2006-11-15 | 皇家飞利浦电子股份有限公司 | 处理数据的系统及其方法 |
CN1875569A (zh) * | 2003-11-03 | 2006-12-06 | 皇家飞利浦电子股份有限公司 | 用于有效多方乘积的方法和设备 |
US8131732B2 (en) * | 2008-06-03 | 2012-03-06 | Nec Laboratories America, Inc. | Recommender system with fast matrix factorization using infinite dimensions |
US8972742B2 (en) * | 2009-09-04 | 2015-03-03 | Gradiant | System for secure image recognition |
US8676736B2 (en) * | 2010-07-30 | 2014-03-18 | Gravity Research And Development Kft. | Recommender systems and methods using modified alternating least squares algorithm |
CN102129462B (zh) * | 2011-03-11 | 2014-06-18 | 北京航空航天大学 | 一种通过聚合对协同过滤推荐系统进行优化的方法 |
CN102129463A (zh) * | 2011-03-11 | 2011-07-20 | 北京航空航天大学 | 一种融合项目相关性的基于pmf的协同过滤推荐系统 |
US20140180760A1 (en) * | 2011-03-18 | 2014-06-26 | Telefonica, S.A. | Method for context-aware recommendations based on implicit user feedback |
US10102546B2 (en) * | 2011-09-15 | 2018-10-16 | Stephan HEATH | System and method for tracking, utilizing predicting, and implementing online consumer browsing behavior, buying patterns, social networking communications, advertisements and communications, for online coupons, products, goods and services, auctions, and service providers using geospatial mapping technology, and social networking |
US8478768B1 (en) * | 2011-12-08 | 2013-07-02 | Palo Alto Research Center Incorporated | Privacy-preserving collaborative filtering |
US8880439B2 (en) * | 2012-02-27 | 2014-11-04 | Xerox Corporation | Robust Bayesian matrix factorization and recommender systems using same |
CN102982107B (zh) * | 2012-11-08 | 2015-09-16 | 北京航空航天大学 | 一种融合用户、项目和上下文属性信息的推荐系统优化方法 |
-
2014
- 2014-05-01 KR KR1020157023839A patent/KR20160041028A/ko not_active Application Discontinuation
- 2014-05-01 CN CN201480021770.2A patent/CN105144625A/zh active Pending
- 2014-05-01 EP EP14731436.3A patent/EP3031165A2/en not_active Withdrawn
- 2014-05-01 CN CN201480012517.0A patent/CN105103487A/zh active Pending
- 2014-05-01 CN CN201480012048.2A patent/CN105009505A/zh active Pending
- 2014-05-01 JP JP2015561769A patent/JP2016510912A/ja active Pending
- 2014-05-01 JP JP2015561770A patent/JP2016517069A/ja active Pending
- 2014-05-01 JP JP2015561771A patent/JP2016510913A/ja active Pending
Also Published As
Publication number | Publication date |
---|---|
JP2016510913A (ja) | 2016-04-11 |
CN105009505A (zh) | 2015-10-28 |
CN105144625A (zh) | 2015-12-09 |
JP2016517069A (ja) | 2016-06-09 |
CN105103487A (zh) | 2015-11-25 |
EP3031165A2 (en) | 2016-06-15 |
JP2016510912A (ja) | 2016-04-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR20160041028A (ko) | 프라이버시 보호 행렬 분해를 위한 방법 및 시스템 | |
US20160004874A1 (en) | A method and system for privacy preserving matrix factorization | |
Giacomelli et al. | Privacy-preserving ridge regression with only linearly-homomorphic encryption | |
Riazi et al. | Chameleon: A hybrid secure computation framework for machine learning applications | |
Bonawitz et al. | Practical secure aggregation for privacy-preserving machine learning | |
Kim et al. | Efficient privacy-preserving matrix factorization via fully homomorphic encryption | |
Gong et al. | Homomorphic evaluation of the integer arithmetic operations for mobile edge computing | |
JP7361928B2 (ja) | 勾配ブースティングを介したプライバシーを守る機械学習 | |
Lin et al. | A generic federated recommendation framework via fake marks and secret sharing | |
Rechberger et al. | Privacy-preserving machine learning using cryptography | |
Lin et al. | Novel design of cryptosystems for video/audio streaming via dynamic synchronized chaos-based random keys | |
Dhasade et al. | TEE-based decentralized recommender systems: The raw data sharing redemption | |
Dasu et al. | PROV-FL: Privacy-preserving round optimal verifiable federated learning | |
Wang et al. | Achieving private and fair truth discovery in crowdsourcing systems | |
Baracaldo et al. | Protecting against data leakage in federated learning: what approach should you choose? | |
Shi et al. | Privacy preserving growing neural gas over arbitrarily partitioned data | |
Zheng et al. | Federated matrix factorization recommendation based on secret sharing for privacy preserving | |
Jung | Ensuring Security and Privacy in Big Data Sharing, Trading, and Computing | |
Chen et al. | Practical multi-party private set intersection cardinality and intersection-sum under arbitrary collusion | |
Ajay | Privacy Preservation using Federated Learning and Homomorphic Encryption: A Study | |
CN108475483B (zh) | 隐匿决定树计算系统、装置、方法以及记录介质 | |
Bao | Privacy-Preserving Cloud-Assisted Data Analytics | |
Bao et al. | Secure multiparty computation protocol based on homomorphic encryption and its application in blockchain | |
Jiang et al. | Taming Client Dropout and Improving Efficiency for Distributed Differential Privacy in Federated Learning | |
Stevens | Secure and Private Federated Learning at Large Scale |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WITN | Withdrawal due to no request for examination |