메뉴 건너뛰기




Volumn , Issue , 2010, Pages 81-90

The limits of two-party differential privacy

Author keywords

[No Author keywords available]

Indexed keywords

HAMMING DISTANCE;

EID: 78751557330     PISSN: 02725428     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/FOCS.2010.14     Document Type: Conference Paper
Times cited : (151)

References (30)
  • 2
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • S. Even, O. Goldreich, and A. Lempel, "A randomized protocol for signing contracts." Communications of the ACM, vol. 28, no. 6, pp. 637-647, 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 5
    • 33745556605 scopus 로고    scopus 로고
    • Calibrating noise to sensitivity in private data analysis
    • Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, ser. S. Halevi and T. Rabin, Eds., Springer
    • C. Dwork, F. McSherry, K. Nissim, and A. Smith, "Calibrating noise to sensitivity in private data analysis," in Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, ser. Lecture Notes in Computer Science, S. Halevi and T. Rabin, Eds., vol. 3876. Springer, 2006, pp. 265-284.
    • (2006) Lecture Notes in Computer Science , vol.3876 , pp. 265-284
    • Dwork, C.1    McSherry, F.2    Nissim, K.3    Smith, A.4
  • 6
    • 33746335051 scopus 로고    scopus 로고
    • Differential privacy
    • Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Part II, ser. M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, Eds., Springer
    • C. Dwork, "Differential privacy," in Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Part II, ser. Lecture Notes in Computer Science, M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, Eds., vol. 4052. Springer, 2006, pp. 1-12.
    • (2006) Lecture Notes in Computer Science , vol.4052 , pp. 1-12
    • Dwork, C.1
  • 8
    • 35048856104 scopus 로고    scopus 로고
    • Privacy-preserving datamining on vertically partitioned databases
    • Advances in Cryptology - CRYPTO 2004, ser. M. K. Franklin, Ed., Springer
    • C. Dwork and K. Nissim, "Privacy-preserving datamining on vertically partitioned databases," in Advances in Cryptology - CRYPTO 2004, ser. Lecture Notes in Computer Science, M. K. Franklin, Ed., vol. 3152. Springer, 2004, pp. 528-544.
    • (2004) Lecture Notes in Computer Science , vol.3152 , pp. 528-544
    • Dwork, C.1    Nissim, K.2
  • 9
    • 51849137365 scopus 로고    scopus 로고
    • Distributed private data analysis: Simultaneously solving how and what
    • Advances in Cryptology - CRYPTO 2008, ser. D. Wagner, Ed., Springer
    • A. Beimel, K. Nissim, and E. Omri, "Distributed private data analysis: Simultaneously solving how and what," in Advances in Cryptology - CRYPTO 2008, ser. Lecture Notes in Computer Science, D. Wagner, Ed., vol. 5157. Springer, 2008, pp. 451-468.
    • (2008) Lecture Notes in Computer Science , vol.5157 , pp. 451-468
    • Beimel, A.1    Nissim, K.2    Omri, E.3
  • 10
    • 33746037200 scopus 로고    scopus 로고
    • Our data, ourselves: Privacy via distributed noise generation
    • Advances in Cryptology - EUROCRYPT 2006, ser. Springer
    • C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor, "Our data, ourselves: privacy via distributed noise generation," in Advances in Cryptology - EUROCRYPT 2006, ser. Lecture Notes in Computer Science, vol. 4004. Springer, 2006, pp. 486-503.
    • (2006) Lecture Notes in Computer Science , vol.4004 , pp. 486-503
    • Dwork, C.1    Kenthapadi, K.2    McSherry, F.3    Mironov, I.4    Naor, M.5
  • 11
    • 70350338483 scopus 로고    scopus 로고
    • Computational differential privacy
    • CRYPTO, ser. S. Halevi, Ed., Springer
    • I. Mironov, O. Pandey, O. Reingold, and S. P. Vadhan, "Computational differential privacy," in CRYPTO, ser. Lecture Notes in Computer Science, S. Halevi, Ed., vol. 5677. Springer, 2009, pp. 126-142.
    • (2009) Lecture Notes in Computer Science , vol.5677 , pp. 126-142
    • Mironov, I.1    Pandey, O.2    Reingold, O.3    Vadhan, S.P.4
  • 12
    • 51249175241 scopus 로고
    • Strong communication complexity or generating quasirandom sequences from two communicating semirandom sources
    • Online. Available
    • U. V. Vazirani, "Strong communication complexity or generating quasirandom sequences from two communicating semirandom sources," Combinatorica, vol. 7, no. 4, pp. 375-392, 1987. [Online]. Available: http://dx.doi.org/10.1007/BF02579325
    • (1987) Combinatorica , vol.7 , Issue.4 , pp. 375-392
    • Vazirani, U.V.1
  • 13
    • 0013776710 scopus 로고
    • Randomized response: A survey technique for eliminating evasive answer bias
    • Mar.
    • S. L. Warner, "Randomized response: A survey technique for eliminating evasive answer bias," Journal of the American Statistical Association, vol. 60, no. 309, pp. 63-69, Mar. 1965.
    • (1965) Journal of the American Statistical Association , vol.60 , Issue.309 , pp. 63-69
    • Warner, S.L.1
  • 18
    • 85043988965 scopus 로고
    • Finding similar files in a large file system
    • U. Manber, "Finding similar files in a large file system," in USENIX Winter, 1994, pp. 1-10.
    • (1994) USENIX Winter , pp. 1-10
    • Manber, U.1
  • 19
    • 77955316963 scopus 로고    scopus 로고
    • Parallel repetition: Simplification and the no-signaling case
    • Online. Available
    • T. Holenstein, "Parallel repetition: Simplification and the no-signaling case," Theory of Computing, vol. 5, no. 1, pp. 141-172, 2009. [Online]. Available: http://www.theoryofcomputing.org/articles/v005a008
    • (2009) Theory of Computing , vol.5 , Issue.1 , pp. 141-172
    • Holenstein, T.1
  • 21
    • 0002738457 scopus 로고
    • A zero-one law for boolean privacy
    • B. Chor and E. Kushilevitz, "A zero-one law for boolean privacy," SIAM J. Discrete Math., vol. 4, no. 1, pp. 36-47, 1991.
    • (1991) SIAM J. Discrete Math. , vol.4 , Issue.1 , pp. 36-47
    • Chor, B.1    Kushilevitz, E.2
  • 22
    • 0002365530 scopus 로고
    • Privacy and communication complexity
    • E. Kushilevitz, "Privacy and communication complexity," SIAM J. Discrete Math., vol. 5, no. 2, pp. 273-284, 1992.
    • (1992) SIAM J. Discrete Math. , vol.5 , Issue.2 , pp. 273-284
    • Kushilevitz, E.1
  • 24
    • 0021469810 scopus 로고
    • Generating quasirandom sequences from semirandom sources
    • Online. Available
    • M. Sántha and U. V. Vazirani, "Generating quasirandom sequences from semirandom sources," Journal of Computer and System Sciences, vol. 33, no. 1, pp. 75-87, 1986. [Online]. Available: http://dx.doi.org/10.1016/0022-0000(86)90044-9
    • (1986) Journal of Computer and System Sciences , vol.33 , Issue.1 , pp. 75-87
    • Sántha, M.1    Vazirani, U.V.2
  • 26
    • 30744451262 scopus 로고    scopus 로고
    • On extracting private randomness over a public channel
    • RANDOM-APPROX, ser. S. Arora, K. Jansen, J. D. P. Rolim, and A. Sahai, Eds., Springer
    • Y. Dodis and R. Oliveira, "On extracting private randomness over a public channel," in RANDOM-APPROX, ser. Lecture Notes in Computer Science, S. Arora, K. Jansen, J. D. P. Rolim, and A. Sahai, Eds., vol. 2764. Springer, 2003, pp. 252-263.
    • (2003) Lecture Notes in Computer Science , vol.2764 , pp. 252-263
    • Dodis, Y.1    Oliveira, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.