[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

A zero-one law for Boolean privacy

Published: 02 January 1991 Publication History

Abstract

No abstract available.

Cited By

View all
  • (2024)Salted Inference: Enhancing Privacy while Maintaining Efficiency of Split Inference in Mobile ComputingProceedings of the 25th International Workshop on Mobile Computing Systems and Applications10.1145/3638550.3641131(14-20)Online publication date: 28-Feb-2024
  • (2022)Unconditionally Secure Oblivious Polynomial Evaluation: A Survey and New ResultsJournal of Computer Science and Technology10.1007/s11390-022-0878-637:2(443-458)Online publication date: 1-Apr-2022
  • (2022)Random Sources in Private ComputationAdvances in Cryptology – ASIACRYPT 202210.1007/978-3-031-22963-3_15(443-473)Online publication date: 5-Dec-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image SIAM Journal on Discrete Mathematics
SIAM Journal on Discrete Mathematics  Volume 4, Issue 1
Feb. 1991
149 pages

Publisher

Society for Industrial and Applied Mathematics

United States

Publication History

Published: 02 January 1991

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Salted Inference: Enhancing Privacy while Maintaining Efficiency of Split Inference in Mobile ComputingProceedings of the 25th International Workshop on Mobile Computing Systems and Applications10.1145/3638550.3641131(14-20)Online publication date: 28-Feb-2024
  • (2022)Unconditionally Secure Oblivious Polynomial Evaluation: A Survey and New ResultsJournal of Computer Science and Technology10.1007/s11390-022-0878-637:2(443-458)Online publication date: 1-Apr-2022
  • (2022)Random Sources in Private ComputationAdvances in Cryptology – ASIACRYPT 202210.1007/978-3-031-22963-3_15(443-473)Online publication date: 5-Dec-2022
  • (2022)Oblivious-Transfer Complexity of Noisy Coin-Toss via Secure Zero Communication ReductionsTheory of Cryptography10.1007/978-3-031-22368-6_4(89-118)Online publication date: 7-Nov-2022
  • (2022)On Perfectly Secure Two-Party Computation for Symmetric Functionalities with Correlated RandomnessTheory of Cryptography10.1007/978-3-031-22365-5_19(532-561)Online publication date: 7-Nov-2022
  • (2021)Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' OutputsProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3484533(825-844)Online publication date: 12-Nov-2021
  • (2020)Zero-Communication ReductionsTheory of Cryptography10.1007/978-3-030-64381-2_10(274-304)Online publication date: 16-Nov-2020
  • (2019)On the foundations of cryptographyProviding Sound Foundations for Cryptography10.1145/3335741.3335759(411-496)Online publication date: 4-Oct-2019
  • (2019)Lower and Upper Bounds on the Randomness Complexity of Private Computations of ANDTheory of Cryptography10.1007/978-3-030-36033-7_15(386-406)Online publication date: 1-Dec-2019
  • (2019)On Fully Secure MPC with Solitary OutputTheory of Cryptography10.1007/978-3-030-36030-6_13(312-340)Online publication date: 1-Dec-2019
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media