共 78 条
- [21] Hackenjos T, Hahn F, Kerschbaum F., SAGMA: Secure aggregation grouped by multiple attributes, Proc of the 2020 ACM SIGMOD Int Conf on Management of Data, pp. 587-601, (2020)
- [22] Rass S, Wigoutschnigg R, Schartner P., Doubly-anonymous crowds: Using secret-sharing to achieve sender and receiver anonymity, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2, 4, pp. 27-41, (2011)
- [23] Fauzi P, Lipmaa H, Zajac M., A shuffle argument secure in the generic model, Proc of the 22nd Int Conf on the Theory and Application of Cryptology and Information Security, pp. 841-872, (2016)
- [24] Maniatis P, Mironov I, Talwar K., Oblivious stash shuffle, (2017)
- [25] Sabt M, Achemlal M, Bouabdallah A., Trusted execution environment: What it is, and what it is not, Proc of the 14th IEEE Int Conf on Trust, Security and Privacy in Computing and Communications, pp. 57-64, (2015)
- [26] Erlingsson u, Feldman V, Mironov I, Et al., Amplification by shuffling: From local to central differential privacy via anonymity, Proc of the 30th Annual ACM-SIAM Symp on Discrete Algorithms, pp. 2468-2479, (2019)
- [27] Kairouz P, Oh S, Viswanath P., Extremal mechanisms for local differential privacy, The Journal of Machine Learning Research, 17, 1, pp. 492-542, (2016)
- [28] Cheu A, Smith A, Ullman J, Et al., Distributed differential privacy via shuffling, Proc of the 38th Annual Int Conf on the Theory and Applications of Cryptographic Techniques, pp. 375-403, (2019)
- [29] Beimel A, Nissim K, Omri E., Distributed private data analysis: Simultaneously solving how and what, Proc of the 28th Annual Int Cryptology Conf, pp. 451-468, (2008)
- [30] Chan T H H, Shi E, Song Dawn, Optimal lower bound for differentially private multi-party aggregation, Proc of the 20th Annual European Symp on Algorithms, pp. 277-288, (2012)