@inproceedings{fdd3ed14854f4ffa842149c689450ae3,
title = "Privacy Preserving Mapping Schemes Supporting Comparison",
abstract = "To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, > relationships among the corresponding data items. We propose three privacy notions, namely ideal privacy, level-1 privacy, and level-2 privacy, and three constructions satisfying these privacy notions respectively.",
keywords = "METIS-277476, Cloud computing, IR-75364, EWI-19183, Privacy, SCS-Cybersecurity, secure 2-party computation",
author = "Qiang Tang",
note = "10.1145/1866835.1866846 ; ACM Cloud Computing Security Workshop, CCSW 2010 ; Conference date: 09-10-2010 Through 09-10-2010",
year = "2010",
month = oct,
doi = "10.1145/1866835.1866846",
language = "Undefined",
isbn = "978-1-4503-0089-6",
publisher = "Association for Computing Machinery",
pages = "53--58",
booktitle = "ACM Cloud Computing Security Workshop (CCSW)",
address = "United States",
}