Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Scalable Privacy-Preserving t-Repetition Protocol with Distributed Medical Data

Full metadata record
DC Field Value Language
dc.contributor.authorChun, Ji Young-
dc.contributor.authorHong, Dowon-
dc.contributor.authorLee, Dong Hoon-
dc.contributor.authorJeong, Ik Rae-
dc.date.accessioned2021-09-06T12:36:04Z-
dc.date.available2021-09-06T12:36:04Z-
dc.date.created2021-06-14-
dc.date.issued2012-12-
dc.identifier.issn0916-8508-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/106813-
dc.description.abstractFinding rare cases with medical data is important when hospitals or research institutes want to identify rare diseases. To extract meaningful information from a large amount of sensitive medical data, privacy-preserving data mining techniques can be used. A privacy-preserving t-repetition protocol can be used to find rare cases with distributed medical data. A privacy-preserving t-repetition protocol is to find elements which exactly t parties out of n parties have in common in their datasets without revealing their private datasets. A privacy-preserving t-repetition protocol can be used to find not only common cases with a high t but also rare cases with a low t. In 2011, Chun et al. suggested the generic set operation protocol which can be used to find t-repeated elements. In the paper, we first show that the Chun et al's protocol becomes infeasible for calculating t-repeated elements if the number of users is getting bigger. That is, the computational and communicational complexities of the Chun et al.'s protocol in calculating t-repeated elements grow exponentially as the number of users grows. Then, we suggest a polynomial-time protocol with respect to the number of users, which calculates t-repeated elements between users.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.subjectSET-
dc.subjectINTERSECTION-
dc.titleScalable Privacy-Preserving t-Repetition Protocol with Distributed Medical Data-
dc.typeArticle-
dc.contributor.affiliatedAuthorChun, Ji Young-
dc.contributor.affiliatedAuthorJeong, Ik Rae-
dc.identifier.doi10.1587/transfun.E95.A.2451-
dc.identifier.scopusid2-s2.0-84870498764-
dc.identifier.wosid000313146100043-
dc.identifier.bibliographicCitationIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E95A, no.12, pp.2451 - 2460-
dc.relation.isPartOfIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES-
dc.citation.titleIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES-
dc.citation.volumeE95A-
dc.citation.number12-
dc.citation.startPage2451-
dc.citation.endPage2460-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordPlusSET-
dc.subject.keywordPlusINTERSECTION-
dc.subject.keywordAuthort-repetition-
dc.subject.keywordAuthorrare cases-
dc.subject.keywordAuthorset operation-
dc.subject.keywordAuthordata mining-
dc.subject.keywordAuthorprivacy-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jeong, Ik Rae photo

Jeong, Ik Rae
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE