메뉴 건너뛰기




Volumn 7417 LNCS, Issue , 2012, Pages 497-516

Differential privacy with imperfect randomness

Author keywords

[No Author keywords available]

Indexed keywords

DIFFERENTIAL PRIVACIES; IMPOSSIBILITY RESULTS; INDISTINGUISHABILITY; LOW SENSITIVITY; NON-TRIVIAL; SECRET KEY;

EID: 84865524308     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-32009-5_29     Document Type: Conference Paper
Times cited : (21)

References (24)
  • 2
    • 33244468835 scopus 로고    scopus 로고
    • Practical privacy: The sulq framework
    • Li, C. (ed.) ACM
    • Blum, A., Dwork, C., McSherry, F., Nissim, K.: Practical privacy: the sulq framework. In: Li, C. (ed.) PODS, pp. 128-138. ACM (2005)
    • (2005) PODS , pp. 128-138
    • Blum, A.1    Dwork, C.2    McSherry, F.3    Nissim, K.4
  • 3
    • 38049035373 scopus 로고    scopus 로고
    • Does Privacy Require True Randomness?
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Bosley, C., Dodis, Y.: Does Privacy Require True Randomness? In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 1-20. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 1-20
    • Bosley, C.1    Dodis, Y.2
  • 5
    • 0023985259 scopus 로고
    • Unbiased bits from sources of weak randomness and probabilistic communication complexity
    • Chor, B., Goldreich, O.: Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM J. Comput. 17(2), 230-261 (1988)
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 230-261
    • Chor, B.1    Goldreich, O.2
  • 6
    • 1142275486 scopus 로고    scopus 로고
    • Revealing information while preserving privacy
    • Neven, F., Beeri, C., Milo, T. (eds.) ACM
    • Dinur, I., Nissim, K.: Revealing information while preserving privacy. In: Neven, F., Beeri, C., Milo, T. (eds.) PODS, pp. 202-210. ACM (2003)
    • (2003) PODS , pp. 202-210
    • Dinur, I.1    Nissim, K.2
  • 7
    • 33749541274 scopus 로고    scopus 로고
    • Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
    • Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
    • Dodis, Y., Katz, J., Reyzin, L., Smith, A.: Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 232-250. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 232-250
    • Dodis, Y.1    Katz, J.2    Reyzin, L.3    Smith, A.4
  • 8
    • 17744370165 scopus 로고    scopus 로고
    • On the (im)possibility of cryptography with imperfect randomness
    • IEEE Computer Society
    • Dodis, Y., Ong, S.J., Prabhakaran, M., Sahai, A.: On the (im)possibility of cryptography with imperfect randomness. In: FOCS, pp. 196-205. IEEE Computer Society (2004)
    • (2004) FOCS , pp. 196-205
    • Dodis, Y.1    Ong, S.J.2    Prabhakaran, M.3    Sahai, A.4
  • 9
    • 0036957025 scopus 로고    scopus 로고
    • On the (non)universality of the one-time pad
    • IEEE Computer Society
    • Dodis, Y., Spencer, J.: On the (non)universality of the one-time pad. In: FOCS, pp. 376-385. IEEE Computer Society (2002)
    • (2002) FOCS , pp. 376-385
    • Dodis, Y.1    Spencer, J.2
  • 10
    • 33745556605 scopus 로고    scopus 로고
    • Calibrating Noise to Sensitivity in Private Data Analysis
    • Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
    • Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating Noise to Sensitivity in Private Data Analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265-284. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3876 , pp. 265-284
    • Dwork, C.1    McSherry, F.2    Nissim, K.3    Smith, A.4
  • 11
    • 35048856104 scopus 로고    scopus 로고
    • Privacy-Preserving Datamining on Vertically Partitioned Databases
    • Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
    • Dwork, C., Nissim, K.: Privacy-Preserving Datamining on Vertically Partitioned Databases. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 528-544. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 528-544
    • Dwork, C.1    Nissim, K.2
  • 12
    • 70350683770 scopus 로고    scopus 로고
    • Universally utility-maximizing privacy mechanisms
    • Mitzenmacher, M. (ed.) ACM
    • Ghosh, A., Roughgarden, T., Sundararajan, M.: Universally utility-maximizing privacy mechanisms. In: Mitzenmacher, M. (ed.) STOC, pp. 351-360. ACM (2009)
    • (2009) STOC , pp. 351-360
    • Ghosh, A.1    Roughgarden, T.2    Sundararajan, M.3
  • 13
    • 77954711905 scopus 로고    scopus 로고
    • On the geometry of differential privacy
    • Schulman, L.J. (ed.) ACM
    • Hardt, M., Talwar, K.: On the geometry of differential privacy. In: Schulman, L.J. (ed.) STOC, pp. 705-714. ACM (2010)
    • (2010) STOC , pp. 705-714
    • Hardt, M.1    Talwar, K.2
  • 14
    • 35448934885 scopus 로고    scopus 로고
    • Parallel repetition: Simplifications and the no-signaling case
    • Johnson, D.S., Feige, U. (eds.) ACM
    • Holenstein, T.: Parallel repetition: simplifications and the no-signaling case. In: Johnson, D.S., Feige, U. (eds.) STOC, pp. 411-419. ACM (2007)
    • (2007) STOC , pp. 411-419
    • Holenstein, T.1
  • 16
    • 84958670019 scopus 로고    scopus 로고
    • Privacy Amplification Secure against Active Adversaries
    • Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
    • Maurer, U.M., Wolf, S.: Privacy Amplification Secure against Active Adversaries. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 307-321. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 307-321
    • Maurer, U.M.1    Wolf, S.2
  • 18
    • 84977114496 scopus 로고
    • On the Impossibility of Private Key Cryptography with Weakly Random Keys
    • Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. Springer, Heidelberg
    • McInnes, J.L., Pinkas, B.: On the Impossibility of Private Key Cryptography with Weakly Random Keys. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 421-435. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.537 , pp. 421-435
    • McInnes, J.L.1    Pinkas, B.2
  • 21
    • 0021469810 scopus 로고
    • Generating quasi-random sequences from semi-random sources
    • Santha, M., Vazirani, U.V.: Generating quasi-random sequences from semi-random sources. J. Comput. Syst. Sci. 33(1), 75-87 (1986)
    • (1986) J. Comput. Syst. Sci. , vol.33 , Issue.1 , pp. 75-87
    • Santha, M.1    Vazirani, U.V.2
  • 22
    • 0022252339 scopus 로고
    • Random polynomial time is equal to slightlyrandom polynomial time
    • IEEE Computer Society
    • Vazirani, U.V., Vazirani, V.V.: Random polynomial time is equal to slightlyrandom polynomial time. In: FOCS, pp. 417-428. IEEE Computer Society (1985)
    • (1985) FOCS , pp. 417-428
    • Vazirani, U.V.1    Vazirani, V.V.2
  • 23
    • 0023364261 scopus 로고
    • Arithmetic coding for data compression
    • Witten, I.H., Neal, R.M., Cleary, J.G.: Arithmetic coding for data compression. Commun. ACM 30(6), 520-540 (1987)
    • (1987) Commun. ACM , vol.30 , Issue.6 , pp. 520-540
    • Witten, I.H.1    Neal, R.M.2    Cleary, J.G.3
  • 24
    • 0001023343 scopus 로고    scopus 로고
    • Simulating BPP using a general weak random source
    • Zuckerman, D.: Simulating BPP using a general weak random source. Algorithmica 16(4/5), 367-391 (1996)
    • (1996) Algorithmica , vol.16 , Issue.4-5 , pp. 367-391
    • Zuckerman, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.