Pawan Kumar
The goal of data mining is to extract or “mine” knowledge from large amounts of data. Privacy, legal and commercial concerns restrict centralized access to this data. Theoretical results from the area of secure multiparty computation in cryptography prove that assuming the existence of trapdoor permutations, one may provide secure protocols for any two-party computation as well as for any multiparty computation with honest majority.
Download PDFDisclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.