{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T20:01:05Z","timestamp":1775678465065,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":39,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540306849","type":"print"},{"value":"9783540322672","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593447_13","type":"book-chapter","created":{"date-parts":[[2005,11,15]],"date-time":"2005-11-15T06:37:16Z","timestamp":1132036636000},"page":"236-252","source":"Crossref","is-referenced-by-count":104,"title":["Privacy-Preserving Graph Algorithms in the Semi-honest Model"],"prefix":"10.1007","author":[{"given":"Justin","family":"Brickell","sequence":"first","affiliation":[]},{"given":"Vitaly","family":"Shmatikov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-540-24676-3_3","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"G. Aggarwal","year":"2004","unstructured":"Aggarwal, G., Mishra, N., Pinkas, B.: Secure computation of the k-th ranked element. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 40\u201355. Springer, Heidelberg (2004)"},{"key":"13_CR2","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1145\/375551.375602","volume-title":"Proc. 20th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS)","author":"D. Agrawal","year":"2001","unstructured":"Agrawal, D., Aggarwal, C.: On the design and quantification of privacy preserving data mining algorithms. In: Proc. 20th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS), pp. 247\u2013255. ACM, New York (2001)"},{"key":"13_CR3","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/872757.872771","volume-title":"Proc. 2003 ACM SIGMOD International Conference on Management of Data","author":"R. Agrawal","year":"2003","unstructured":"Agrawal, R., Evfimievski, A., Srikant, R.: Information sharing across private databases. In: Proc. 2003 ACM SIGMOD International Conference on Management of Data, pp. 86\u201397. ACM, New York (2003)"},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1145\/342009.335438","volume-title":"Proc. 2000 ACM SIGMOD International Conference on Management of Data","author":"R. Agrawal","year":"2000","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proc. 2000 ACM SIGMOD International Conference on Management of Data, pp. 439\u2013450. ACM, New York (2000)"},{"key":"13_CR5","first-page":"922","volume-title":"Proc. 29th International Conference on Very Large Databases (VLDB)","author":"M. Bawa","year":"2003","unstructured":"Bawa, M., Bayardo, R., Agrawal, R.: Privacy-preserving indexing of documents on the network. In: Proc. 29th International Conference on Very Large Databases (VLDB), pp. 922\u2013933. Morgan Kaufmann, San Francisco (2003)"},{"key":"13_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1007\/3-540-46766-1_31","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"D. Beaver","year":"1992","unstructured":"Beaver, D.: Foundations of secure interactive computing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 377\u2013391. Springer, Heidelberg (1992)"},{"issue":"1","key":"13_CR7","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s001459910006","volume":"13","author":"R. Canetti","year":"2000","unstructured":"Canetti, R.: Security and composition of multiparty cryptograpic protocols. J. Cryptology\u00a013(1), 143\u2013202 (2000)","journal-title":"J. Cryptology"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-540-30576-7_20","volume-title":"Theory of Cryptography","author":"S. Chawla","year":"2005","unstructured":"Chawla, S., Dwork, C., McSherry, F., Smith, A., Wee, H.: Towards privacy in public databases. In: Kilian, J. (ed.) TCC 2005. LNCS, vol.\u00a03378, pp. 363\u2013385. Springer, Heidelberg (2005)"},{"issue":"6","key":"13_CR9","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1145\/293347.293350","volume":"45","author":"B. Chor","year":"1998","unstructured":"Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM\u00a045(6), 965\u2013981 (1998)","journal-title":"J. ACM"},{"issue":"2","key":"13_CR10","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/772862.772867","volume":"4","author":"C. Clifton","year":"2002","unstructured":"Clifton, C., Kantarcioglou, M., Vaidya, J., Lin, X., Zhu, M.: Tools for privacy preserving distributed data mining. ACM SIGKDD Explorations\u00a04(2), 28\u201334 (2002)","journal-title":"ACM SIGKDD Explorations"},{"key":"13_CR11","volume-title":"Introduction to Algorithms","author":"T. Cormen","year":"1990","unstructured":"Cormen, T., Leiserson, C., Rivest, R.: Introduction to Algorithms. MIT Press, Cambridge (1990)"},{"key":"13_CR12","first-page":"202","volume-title":"Proc. 22nd ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS)","author":"I. Dinur","year":"2003","unstructured":"Dinur, I., Nissim, K.: Revealing information while preserving privacy. In: Proc. 22nd ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS), pp. 202\u2013210. ACM, New York (2003)"},{"key":"13_CR13","first-page":"273","volume-title":"Proc. 14th IEEE Computer Security Foundations Workshop (CSFW)","author":"W. Du","year":"2001","unstructured":"Du, W., Atallah, M.: Privacy-preserving cooperative scientific computations. In: Proc. 14th IEEE Computer Security Foundations Workshop (CSFW), pp. 273\u2013294. IEEE, Los Alamitos (2001)"},{"key":"13_CR14","first-page":"102","volume-title":"Proc. 17th Annual Computer Security Applications Conference (ACSAC)","author":"W. Du","year":"2001","unstructured":"Du, W., Atallah, M.: Privacy-preserving cooperative statistical analysis. In: Proc. 17th Annual Computer Security Applications Conference (ACSAC), pp. 102\u2013112. IEEE, Los Alamitos (2001)"},{"key":"13_CR15","first-page":"222","volume-title":"Proc. 4th SIAM International Conference on Data Mining (SDM)","author":"W. Du","year":"2004","unstructured":"Du, W., Han, Y., Chen, S.: Privacy-preserving multivariate statistical analysis: linear regression and classification. In: Proc. 4th SIAM International Conference on Data Mining (SDM), pp. 222\u2013233. SIAM, Philadelphia (2004)"},{"key":"13_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1007\/978-3-540-28628-8_32","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"C. Dwork","year":"2004","unstructured":"Dwork, C., Nissim, K.: Privacy-preserving data mining on vertically partitioned databases. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 528\u2013544. Springer, Heidelberg (2004)"},{"issue":"4","key":"13_CR17","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1016\/j.is.2003.09.001","volume":"29","author":"A. Evfimievski","year":"2004","unstructured":"Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy preserving mining of association rules. Information Systems\u00a029(4), 343\u2013364 (2004)","journal-title":"Information Systems"},{"key":"13_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1007\/3-540-48224-5_75","volume-title":"Automata, Languages and Programming","author":"J. Feigenbaum","year":"2001","unstructured":"Feigenbaum, J., Ishai, Y., Malkin, T., Nissim, K., Strauss, M., Wright, R.: Secure multiparty computation of approximations. In: Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. LNCS, vol.\u00a02076, pp. 927\u2013938. Springer, Heidelberg (2001)"},{"key":"13_CR19","unstructured":"Feigenbaum, J., Pinkas, B., Ryger, R., Saint-Jean, F.: Secure computation of surveys. In: Proc. EU Workshop on Secure Multiparty Protocols (2004)"},{"key":"13_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-24676-3_1","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"M. Freedman","year":"2004","unstructured":"Freedman, M., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 1\u201319. Springer, Heidelberg (2004)"},{"issue":"3","key":"13_CR21","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1006\/jcss.1999.1689","volume":"60","author":"Y. Gertner","year":"2000","unstructured":"Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. J. Computer and System Sciences\u00a060(3), 592\u2013629 (2000)","journal-title":"J. Computer and System Sciences"},{"key":"13_CR22","series-title":"(Basic Applications)","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656","volume-title":"Foundations of Cryptography","author":"O. Goldreich","year":"2004","unstructured":"Goldreich, O.: Foundations of Cryptography (Basic Applications), vol.\u00a0II. Cambridge University Press, Cambridge (2004)"},{"key":"13_CR23","first-page":"218","volume-title":"Proc. Annual 19th ACM Symposium on Theory of Computing (STOC)","author":"O. Goldreich","year":"1987","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proc. Annual 19th ACM Symposium on Theory of Computing (STOC), pp. 218\u2013229. ACM, New York (1987)"},{"key":"13_CR24","unstructured":"Kantarcioglu, M., Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. In: Proc. ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (DMKD). ACM, New York (2002)"},{"key":"13_CR25","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1145\/1014052.1014126","volume-title":"Proc. 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)","author":"M. Kantarcioglu","year":"2004","unstructured":"Kantarcioglu, M., Jin, J., Clifton, C.: When do data mining results violate privacy? In: Proc. 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), pp. 599\u2013604. ACM, New York (2004)"},{"key":"13_CR26","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/ICDM.2003.1250908","volume-title":"Proc. 3rd IEEE International Conference on Data Mining (ICDM)","author":"H. Kargupta","year":"2003","unstructured":"Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: Proc. 3rd IEEE International Conference on Data Mining (ICDM), pp. 99\u2013106. IEEE, Los Alamitos (2003)"},{"key":"13_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/11535218_15","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"L. Kissner","year":"2005","unstructured":"Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 241\u2013257. Springer, Heidelberg (2005)"},{"issue":"3","key":"13_CR28","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s00145-001-0019-2","volume":"15","author":"Y. Lindell","year":"2002","unstructured":"Lindell, Y., Pinkas, B.: Privacy preserving data mining. J. Cryptology\u00a015(3), 177\u2013206 (2002)","journal-title":"J. Cryptology"},{"key":"13_CR29","unstructured":"Lindell, Y., Pinkas, B.: A proof of Yao\u2019s protocol for secure two-party computation (2004), \n                    \n                      http:\/\/eprint.iacr.org\/2004\/175"},{"key":"13_CR30","first-page":"590","volume-title":"Proc. 33rd Annual ACM Symposium on Theory of Computing (STOC)","author":"M. Naor","year":"2001","unstructured":"Naor, M., Nissim, K.: Communication preserving protocols for secure function evaluation. In: Proc. 33rd Annual ACM Symposium on Theory of Computing (STOC), pp. 590\u2013599. ACM, New York (2001)"},{"key":"13_CR31","first-page":"448","volume-title":"Proc. 12th Annual Symposium on Discrete Algorithms (SODA)","author":"M. Naor","year":"2001","unstructured":"Naor, M., Pinkas, B.: Efficient oblivious transfer protocols. In: Proc. 12th Annual Symposium on Discrete Algorithms (SODA), pp. 448\u2013457. ACM, New York (2001)"},{"issue":"1","key":"13_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00145-004-0102-6","volume":"18","author":"M. Naor","year":"2005","unstructured":"Naor, M., Pinkas, B.: Computationally secure oblivious transfer. J. Cryptology\u00a018(1), 1\u201335 (2005)","journal-title":"J. Cryptology"},{"key":"13_CR33","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1145\/336992.337028","volume-title":"Proc. 1st ACM Conference on Electronic Commerce","author":"M. Naor","year":"1999","unstructured":"Naor, M., Pinkas, B., Sumner, R.: Privacy preserving auctions and mechanism design. In: Proc. 1st ACM Conference on Electronic Commerce, pp. 129\u2013139. ACM, New York (1999)"},{"key":"13_CR34","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1109\/ICDM.2003.1250993","volume-title":"Proc. 3rd IEEE International Conference on Data Mining (ICDM)","author":"H. Polat","year":"2003","unstructured":"Polat, H., Du, W.: Privacy-preserving collaborative filtering using randomized perturbation techniques. In: Proc. 3rd IEEE International Conference on Data Mining (ICDM), pp. 625\u2013628. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"13_CR35","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1145\/775047.775142","volume-title":"Proc. 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)","author":"J. Vaidya","year":"2002","unstructured":"Vaidya, J., Clifton, C.: Privacy-preserving association rule mining in vertically partitioned data. In: Proc. 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), pp. 639\u2013644. ACM, New York (2002)"},{"issue":"1","key":"13_CR36","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/974121.974131","volume":"33","author":"V. Verykios","year":"2004","unstructured":"Verykios, V., Bertino, E., Fovino, I., Provenza, L., Saygin, Y., Theodoridis, Y.: State-of-the-art in privacy preserving data mining. SIGMOD Record\u00a033(1), 50\u201357 (2004)","journal-title":"SIGMOD Record"},{"key":"13_CR37","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1145\/1014052.1014145","volume-title":"Proc. 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)","author":"R. Wright","year":"2004","unstructured":"Wright, R., Yang, Z.: Privacy-preserving Bayesian network structure computation on distributed heterogeneous data. In: Proc. 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), pp. 713\u2013718. ACM, New York (2004)"},{"key":"13_CR38","volume-title":"Proc. 5th SIAM International Conference on Data Mining (SDM)","author":"Z. Yang","year":"2005","unstructured":"Yang, Z., Zhong, S., Wright, R.: Privacy-preserving classification of customer data without loss of accuracy. In: Proc. 5th SIAM International Conference on Data Mining (SDM), SIAM, Philadelphia (2005)"},{"key":"13_CR39","first-page":"162","volume-title":"Proc. 27th IEEE Symposium on Foundations of Computer Science (FOCS)","author":"A. Yao","year":"1986","unstructured":"Yao, A.: How to generate and exchange secrets. In: Proc. 27th IEEE Symposium on Foundations of Computer Science (FOCS), pp. 162\u2013167. IEEE, Los Alamitos (1986)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - ASIACRYPT 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593447_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:51:44Z","timestamp":1619506304000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593447_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540306849","9783540322672"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/11593447_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}