{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:19:51Z","timestamp":1743031191254,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642402029"},{"type":"electronic","value":"9783642402036"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40203-6_24","type":"book-chapter","created":{"date-parts":[[2013,8,14]],"date-time":"2013-08-14T02:48:53Z","timestamp":1376448533000},"page":"418-442","source":"Crossref","is-referenced-by-count":5,"title":["Privacy-Preserving User Data Oriented Services for Groups with Dynamic Participation"],"prefix":"10.1007","author":[{"given":"Dmitry","family":"Kononchuk","sequence":"first","affiliation":[]},{"given":"Zekeriya","family":"Erkin","sequence":"additional","affiliation":[]},{"given":"Jan C. A.","family":"van der Lubbe","sequence":"additional","affiliation":[]},{"given":"Reginald L.","family":"Lagendijk","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"McSherry, F., Mironov, I.: Differentially Private Recommender Systems: Building Privacy into the Netflix Prize Contenders. In: Elder IV, J.F., Fogelman-Souli\u00e9, F., Flach, P.A., Zaki, M.J. (eds.) KDD, pp. 627\u2013636. ACM (2009)","DOI":"10.1145\/1557019.1557090"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Beye, M., Erkin, Z., Lagendijk, R.: Efficient privacy preserving K-means clustering in a three-party setting. In: IEEE International Workshop on Information Forensics and Security, WIFS, pp. 1\u20136. IEEE (2011)","DOI":"10.1109\/WIFS.2011.6123148"},{"key":"24_CR3","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1109\/TIFS.2012.2190726","volume":"7","author":"Z. Erkin","year":"2012","unstructured":"Erkin, Z., Veugen, T., Toft, T., Lagendijk, R.: Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing. IEEE Transactions on Information Forensics and Security\u00a07, 1053\u20131066 (2012)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"24_CR4","unstructured":"Canny, J.: Collaborative filtering with privacy. In: IEEE Symposium on Security and Privacy, pp. 45\u201357. IEEE, IEEE Computer Society (2002)"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Jagannathan, G., Pillaipakkamnatt, K., Wright, R.: A new privacy-preserving distributed k-clustering algorithm. In: Proceedings of the Sixth SIAM International Conference on Data Mining, pp. 492\u2013496 (2006)","DOI":"10.1137\/1.9781611972764.47"},{"key":"24_CR6","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/245108.245121","volume":"40","author":"P. Resnick","year":"1997","unstructured":"Resnick, P., Varian, H.R.: Recommender Systems - Introduction to the Special Section. Commun. ACM\u00a040, 56\u201358 (1997)","journal-title":"Commun. ACM"},{"key":"24_CR7","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/355112.355122","volume":"43","author":"P. Resnick","year":"2000","unstructured":"Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation systems. Commun. ACM\u00a043, 45\u201348 (2000)","journal-title":"Commun. ACM"},{"key":"24_CR8","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/0165-0114(86)90014-X","volume":"18","author":"J. Kacprzyk","year":"1986","unstructured":"Kacprzyk, J.: Group decision making with a fuzzy linguistic majority. Fuzzy Sets and Systems\u00a018, 105\u2013118 (1986)","journal-title":"Fuzzy Sets and Systems"},{"key":"24_CR9","unstructured":"Mathes, A.: Folksonomies \u2013 cooperative classification and communication through shared metadata. Computer Mediated Communication 47 (2004)"},{"key":"24_CR10","unstructured":"Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the Privacy Preserving Properties of Random Data Perturbation Techniques. In: ICDM, pp. 99\u2013106. IEEE Computer Society (2003)"},{"key":"24_CR11","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/1540276.1540279","volume":"10","author":"B. Zhou","year":"2008","unstructured":"Zhou, B., Pei, J., Luk, W.S.: A brief survey on anonymization techniques for privacy preserving publishing of social network data. SIGKDD Explorations\u00a010, 12\u201322 (2008)","journal-title":"SIGKDD Explorations"},{"key":"24_CR12","first-page":"160","volume-title":"Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science","author":"A.C. Yao","year":"1982","unstructured":"Yao, A.C.: Protocols for secure computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, pp. 160\u2013164. IEEE Computer Society, Washington, DC (1982)"},{"key":"24_CR13","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: CLIQUES: a new approach to group key agreement. In: Papazoglou, M.P., Takizawa, M., Kramer, B., Chanson, S. (eds.) ICDCS, pp. 380\u2013387 (1998)"},{"key":"24_CR14","doi-asserted-by":"publisher","first-page":"2325","DOI":"10.1007\/s10916-011-9700-7","volume":"36","author":"S. Wu","year":"2012","unstructured":"Wu, S., Chen, K.: An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System. Journal of Medical Systems\u00a036, 2325\u20132337 (2012)","journal-title":"Journal of Medical Systems"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: M-invariance: towards privacy preserving re-publication of dynamic datasets. In: Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data, pp. 689\u2013700. ACM (2007)","DOI":"10.1145\/1247480.1247556"},{"key":"24_CR16","first-page":"845","volume":"1","author":"Y. Bu","year":"2008","unstructured":"Bu, Y., Fu, A.W.C., Wong, R.C.W., Chen, L., Li, J.: Privacy preserving serial data publishing by role composition. PVLDB\u00a01, 845\u2013856 (2008)","journal-title":"PVLDB"},{"key":"24_CR17","first-page":"6","volume-title":"Proceedings of the 3rd Conference on Online Social Networks, WOSN 2010","author":"S. Bhagat","year":"2010","unstructured":"Bhagat, S., Cormode, G., Krishnamurthy, B., Divesh, S.: Prediction promotes privacy in dynamic social networks. In: Proceedings of the 3rd Conference on Online Social Networks, WOSN 2010, p. 6. USENIX Association, Berkeley (2010)"},{"key":"24_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/3-540-45472-1_7","volume-title":"Financial Cryptography","author":"P.-A. Fouque","year":"2001","unstructured":"Fouque, P.-A., Poupard, G., Stern, J.: Sharing decryption in the context of voting or lotteries. In: Frankel, Y. (ed.) FC 2000. LNCS, vol.\u00a01962, pp. 90\u2013104. Springer, Heidelberg (2001)"},{"key":"24_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-642-17955-6_4","volume-title":"Information Security Applications","author":"T. Nishide","year":"2011","unstructured":"Nishide, T., Sakurai, K.: Distributed Paillier Cryptosystem without Trusted Dealer. In: Chung, Y., Yung, M. (eds.) WISA 2010. LNCS, vol.\u00a06513, pp. 44\u201360. Springer, Heidelberg (2011)"},{"key":"24_CR20","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to Share a Secret. Commun. ACM\u00a022, 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"24_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P. Paillier","year":"1999","unstructured":"Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"key":"24_CR22","series-title":"Information Security and Cryptography","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-642-14303-8_6","volume-title":"Efficient Secure Two-Party Protocols","author":"C. Hazay","year":"2010","unstructured":"Hazay, C., Lindell, Y.: Sigma Protocols and Efficient Zero-Knowledge. In: Efficient Secure Two-Party Protocols. Information Security and Cryptography, pp. 147\u2013175. Springer, Heidelberg (2010)"},{"key":"24_CR23","doi-asserted-by":"crossref","unstructured":"Blum, M., Feldman, P., Micali, S.: Non-Interactive Zero-Knowledge and Its Applications (Extended Abstract). In: Simon, J. (ed.) STOC, pp. 103\u2013112. ACM (1988)","DOI":"10.1145\/62212.62222"},{"key":"24_CR24","unstructured":"Cramer, R., Damg\u00e5rd, I., Nielsen, J.B.: Multiparty Computation from Threshold Homomorphic Encryption. Cryptology ePrint Archive, Report 2000\/055 (2000), \n                    \n                      http:\/\/eprint.iacr.org\/2000\/055"},{"key":"24_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/3-540-44987-6_18","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"R. Cramer","year":"2001","unstructured":"Cramer, R., Damg\u00e5rd, I., Nielsen, J.B.: Multiparty Computation from Threshold Homomorphic Encryption. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 280\u2013299. Springer, Heidelberg (2001)"},{"key":"24_CR26","doi-asserted-by":"crossref","unstructured":"Bar-Ilan, J., Beaver, D.: Non-cryptographic fault-tolerant computing in constant number of rounds of interaction. In: Proceedings of the Eighth Annual ACM Symposium on Principles of Distributed Computing, pp. 201\u2013209. ACM (1989)","DOI":"10.1145\/72981.72995"},{"key":"24_CR27","unstructured":"Davies, R.: Exclusive OR (XOR) and hardware random number generators (2002), \n                    \n                      http:\/\/www.robertnz.net\/"},{"key":"24_CR28","doi-asserted-by":"crossref","unstructured":"Barker, E., Barker, W., Burr, W., Polk, W., Smid, M.: Recommendation for key management\u2013part 1: General (revision 3). NIST special publication 800-57 (2012)","DOI":"10.6028\/NIST.SP.800-57p1r3"},{"key":"24_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/11681878_15","volume-title":"Theory of Cryptography","author":"I. Damg\u00e5rd","year":"2006","unstructured":"Damg\u00e5rd, I., Fitzi, M., Kiltz, E., Nielsen, J.B., Toft, T.: Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol.\u00a03876, pp. 285\u2013304. Springer, Heidelberg (2006)"},{"key":"24_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/978-3-642-00730-9_13","volume-title":"Information Security and Cryptology \u2013 ICISC 2008","author":"K. Peng","year":"2009","unstructured":"Peng, K., Bao, F.: Efficient Vote Validity Check in Homomorphic Electronic Voting. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol.\u00a05461, pp. 202\u2013217. Springer, Heidelberg (2009)"},{"key":"24_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/0-387-34799-2_16","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"L.C. Guillou","year":"1990","unstructured":"Guillou, L.C., Quisquater, J.-J.: A \u201cParadoxical\u201d identity-based signature scheme resulting from zero-knowledge. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 216\u2013231. Springer, Heidelberg (1990)"},{"key":"24_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-642-15317-4_13","volume-title":"Security and Cryptography for Networks","author":"O. Catrina","year":"2010","unstructured":"Catrina, O., de Hoogh, S.: Improved Primitives for Secure Multiparty Integer Computation. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol.\u00a06280, pp. 182\u2013199. Springer, Heidelberg (2010)"},{"key":"24_CR33","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Commun. ACM\u00a024, 84\u201388 (1981)","journal-title":"Commun. ACM"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2013"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40203-6_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:44:19Z","timestamp":1559508259000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40203-6_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642402029","9783642402036"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40203-6_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}