Design of shuffling protocol based on additive secret sharing
Aiming at the problems such as lack of specific algorithms for process implementation, using public keys in most of the solutions, low efficiency in dealing with large-scale data sets, and lack of applicability, a unilateral shuffling protocol was proposed, and on this basis, a shuffling protocol ba...
Saved in:
| Main Authors: | ZHANG Yanshuo, MAN Ziqi, ZHOU Xingyu, YANG Yatao, HU Ronglei |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2024-08-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024146/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A Reliable Aggregation Method Based on Threshold Additive Secret Sharing in Federated Learning with Quality of Service (QoS) Support
by: Yu-Ting Ting, et al.
Published: (2024-10-01) -
Fast and Private 1-to-<inline-formula><tex-math notation="LaTeX">$N$</tex-math></inline-formula> Face Identification Protocols
by: Nuttapong Attrapadung, et al.
Published: (2025-01-01) -
Light weighted privacy protection ViT inference framework based on secret sharing
by: MA Min, et al.
Published: (2024-04-01) -
Shuffled differential privacy protection method for K-Modes clustering data collection and publication
by: Weijin JIANG, et al.
Published: (2024-01-01) -
Privacy-Preserving Data Uploading SchemeBased on Threshold Secret Sharing Algorithm for Internet of Vehicles
by: Zheng Jiang, et al.
Published: (2025-05-01)