... edition [Han and Kamber, 2006] Han, J and Kamber, M (2006) Data Mining: Concepts and Techniques 2nd ed (The Morgan Kaufmann Series in Data Management Systems) Morgan Kaufmann Publishers [Han and Ng, ... + i=2 ri mod M and k = k11 + i=2 ki mod M 6: P1 and Pn use the approximate ln(x) protocol given in [Lindell and Pinkas, 2000] P1 obtains a1 and b1 , Pn obtains an and bn a1 + an = α ln (u − ... Theory and Applications of Cryptology and Information Security: Advances in Cryptology, pages 125–132 SpringerVerlag 26 [Naor and Pinkas, 1999] Naor, M and Pinkas, B (1999) Oblivious transfer and...