Privacy-preserving linear and nonlinear approximation via linear programming

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy-preserving linear and nonlinear approximation via linear programming

We propose a novel privacy-preserving random kernel approximation based on a data matrix A ∈ R whose rows are divided into privately owned blocks. Each block of rows belongs to a different entity that is unwilling to share its rows or make them public. We wish to obtain an accurate function approximation for a given y ∈ Rm corresponding to each of the m rows of A. Our approximation of y is a re...

متن کامل

Privacy-preserving linear programming

We propose a privacy-preserving formulation of a linear program whose constraint matrix is partitioned into groups of columns where each group of columns and its corresponding cost coefficient vector are owned by a distinct entity. Each entity is unwilling to share or make public its column group or cost coefficient vector. By employing a random matrix transformation we construct a linear progr...

متن کامل

Secure Linear Programming Using Privacy-Preserving Simplex

The SecureSCM project (www.securescm.org) aims to develop cryptographic solutions to the problem of data sharing in Supply Chain Optimization (SCO). The SCO problem has a precise mathematical structure. It is an instance of the general Linear Programming (LP) problem. However, standard techniques for LP problems are not suitable for this purpose because they require participants to reveal priva...

متن کامل

Lecture 6 : Provable Approximation via Linear Programming

One of the running themes in this course is the notion of approximate solutions. Of course, this notion is tossed around a lot in applied work: whenever the exact solution seems hard to achieve, you do your best and call the resulting solution an approximation. In theoretical work, approximation has a more precise meaning whereby you prove that the computed solution is close to the exact or opt...

متن کامل

New Attacks against Transformation-Based Privacy-Preserving Linear Programming

In this paper we demonstrate a number of attacks against proposed protocols for privacypreserving linear programming, based on publishing and solving a transformed version of the problem instance. Our attacks exploit the geometric structure of the problem, which has mostly been overlooked in the previous analyses and is largely preserved by the proposed transformations. The attacks are efficien...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Optimization Methods and Software

سال: 2013

ISSN: 1055-6788,1029-4937

DOI: 10.1080/10556788.2012.710615