메뉴 건너뛰기




Volumn , Issue , 2012, Pages 400-409

The privacy of the analyst and the power of the state

Author keywords

differential privacy; list decoding; long code

Indexed keywords

DATA ANALYSTS; DIFFERENTIAL PRIVACIES; LIST DECODING; LONG CODES; NON-TRIVIAL; PRIVACY MECHANISMS; PRIVATE DATA ANALYSIS;

EID: 84871959002     PISSN: 02725428     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/FOCS.2012.87     Document Type: Conference Paper
Times cited : (32)

References (25)
  • 3
    • 78650804208 scopus 로고    scopus 로고
    • A firm foundation for private data analysis
    • C. Dwork, "A firm foundation for private data analysis," Communications of the ACM, vol. 54, 2011.
    • (2011) Communications of the ACM , vol.54
    • Dwork, C.1
  • 4
    • 84871984007 scopus 로고    scopus 로고
    • Online; Accessed April 04, 2012
    • "American library association, "other policies and guidelines"," http://www.ala.org/Template.cfm?Section= otherpolicies&Template=/ContentManagement/ContentDisplay.cfm&ContentID= 13084, [Online; Accessed April 04, 2012].
    • American Library Association, "Other Policies and Guidelines"
  • 5
    • 0032201622 scopus 로고    scopus 로고
    • Private information retrieval
    • preliminary version in FOCS, 1995
    • B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, "Private information retrieval," JACM, 1998, preliminary version in FOCS, 1995.
    • (1998) JACM
    • Chor, B.1    Goldreich, O.2    Kushilevitz, E.3    Sudan, M.4
  • 6
    • 84879521412 scopus 로고    scopus 로고
    • Secure multiparty computation of approximations
    • ICALP, ser. F. Orejas, P. G. Spirakis, and J. van Leeuwen, Eds., Springer
    • J. Feigenbaum, Y. Ishai, T. Malkin, K. Nissim, M. Strauss, and R. N. Wright, "Secure multiparty computation of approximations," in ICALP, ser. Lecture Notes in Computer Science, F. Orejas, P. G. Spirakis, and J. van Leeuwen, Eds., vol. 2076. Springer, 2001, pp. 927-938.
    • (2001) Lecture Notes in Computer Science , vol.2076 , pp. 927-938
    • Feigenbaum, J.1    Ishai, Y.2    Malkin, T.3    Nissim, K.4    Strauss, M.5    Wright, R.N.6
  • 7
    • 0034837160 scopus 로고    scopus 로고
    • Anti-presistence: History independent data structures
    • New York: ACM, Online. Available
    • M. Naor and V. Teague, "Anti-presistence: history independent data structures," in Proceedings of the Thirty-Third Annual ACM Symposium on Theory of Computing. New York: ACM, 2001, pp. 492-501. [Online]. Available: http://dx.doi.org/10.1145/380752. 380844
    • (2001) Proceedings of the Thirty-Third Annual ACM Symposium on Theory of Computing , pp. 492-501
    • Naor, M.1    Teague, V.2
  • 10
    • 51849137365 scopus 로고    scopus 로고
    • Distributed private data analysis: Simultaneously solving how and what
    • CRYPTO, ser. D. Wagner, Ed., Springer
    • A. Beimel, K. Nissim, and E. Omri, "Distributed private data analysis: Simultaneously solving how and what," in CRYPTO, ser. Lecture Notes in Computer Science, D. Wagner, Ed., vol. 5157. Springer, 2008, pp. 451-468.
    • (2008) Lecture Notes in Computer Science , vol.5157 , pp. 451-468
    • Beimel, A.1    Nissim, K.2    Omri, E.3
  • 12
    • 70350689921 scopus 로고    scopus 로고
    • On the complexity of differentially private data release: Efficient algorithms and hardness results
    • C. Dwork, M. Naor, O. Reingold, G. N. Rothblum, and S. Vadhan, "On the complexity of differentially private data release: efficient algorithms and hardness results," in STOC, 2009, pp. 381-390.
    • (2009) STOC , pp. 381-390
    • Dwork, C.1    Naor, M.2    Reingold, O.3    Rothblum, G.N.4    Vadhan, S.5
  • 13
    • 77954719763 scopus 로고    scopus 로고
    • The median mechanism: Interactive and efficient privacy with multiple queries
    • A. Roth and T. Roughgarden, "The median mechanism: Interactive and efficient privacy with multiple queries," in Proc. of STOC, pp. 765-774.
    • Proc. of STOC , pp. 765-774
    • Roth, A.1    Roughgarden, T.2
  • 14
  • 15
    • 78751482528 scopus 로고    scopus 로고
    • A multiplicative weights mechanism for interactive privacy-preserving data analysis
    • M. Hardt and G. N. Rothblum, "A multiplicative weights mechanism for interactive privacy-preserving data analysis," Proc. FOCS, 2010.
    • (2010) Proc. FOCS
    • Hardt, M.1    Rothblum, G.N.2
  • 16
    • 79959740503 scopus 로고    scopus 로고
    • Privately releasing conjunctions and the statistical query barrier
    • A. Gupta, M. Hardt, A. Roth, and J. Ullman, "Privately releasing conjunctions and the statistical query barrier," in STOC, 2011, pp. 803-812.
    • (2011) STOC , pp. 803-812
    • Gupta, A.1    Hardt, M.2    Roth, A.3    Ullman, J.4
  • 18
    • 0542423500 scopus 로고    scopus 로고
    • Free bits, PCPs, and nonapproximability-towards tight results
    • Online. Available
    • M. Bellare, O. Goldreich, and M. Sudan, "Free bits, PCPs, and nonapproximability-towards tight results," SIAM Journal on Computing, vol. 27, no. 3, pp. 804-915, 1998. [Online]. Available: http://dx.doi.org/10.1137/ S0097539796302531
    • (1998) SIAM Journal on Computing , vol.27 , Issue.3 , pp. 804-915
    • Bellare, M.1    Goldreich, O.2    Sudan, M.3
  • 20
    • 77954717626 scopus 로고    scopus 로고
    • Differential privacy under continual observation
    • C. Dwork, M. Naor, T. Pitassi, and G. N. Rothblum, "Differential privacy under continual observation," in STOC, 2010, pp. 715-724.
    • (2010) STOC , pp. 715-724
    • Dwork, C.1    Naor, M.2    Pitassi, T.3    Rothblum, G.N.4
  • 21
    • 85041117781 scopus 로고    scopus 로고
    • The price of privately releasing contingency tables and the spectra of random matrices with correlated rows
    • S. P. Kasiviswanathan, M. Rudelson, A. Smith, and J. Ullman, "The price of privately releasing contingency tables and the spectra of random matrices with correlated rows," in STOC, 2011.
    • (2011) STOC
    • Kasiviswanathan, S.P.1    Rudelson, M.2    Smith, A.3    Ullman, J.4
  • 23
    • 0024868772 scopus 로고
    • A hard-core predicate for all one-way functions
    • O. Goldreich and L. A. Levin, "A hard-core predicate for all one-way functions," in STOC, 1989, pp. 25-32.
    • (1989) STOC , pp. 25-32
    • Goldreich, O.1    Levin, L.A.2
  • 24
    • 84863421549 scopus 로고    scopus 로고
    • Iterative constructions and private data release
    • Proceedings of the 9th IACR Theory of Cryptography Conference (TCC '12), ser. Springer-Verlag, full version posted as CoRR abs/1107.3731
    • A. Gupta, A. Roth, and J. Ullman, "Iterative constructions and private data release," in Proceedings of the 9th IACR Theory of Cryptography Conference (TCC '12), ser. Lecture Notes on Computer Science. Springer-Verlag, 2012, full version posted as CoRR abs/1107.3731.
    • (2012) Lecture Notes on Computer Science
    • Gupta, A.1    Roth, A.2    Ullman, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.