메뉴 건너뛰기




Volumn , Issue , 2014, Pages 1-10

Fingerprinting codes and the price of approximate differential privacy

Author keywords

Differential privacy; Fingerprinting codes

Indexed keywords

ALGORITHMS; CODES (SYMBOLS);

EID: 84904197571     PISSN: 07378017     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2591796.2591877     Document Type: Conference Paper
Times cited : (171)

References (33)
  • 1
    • 35448955720 scopus 로고    scopus 로고
    • Privacy, accuracy, and consistency too: A holistic solution to contingency table release
    • Barak, B., Chaudhuri, K., Dwork, C., Kale, S., McSherry, F., and Talwar, K. Privacy, accuracy, and consistency too: a holistic solution to contingency table release. In PODS (2007), pp. 273-282.
    • (2007) PODS , pp. 273-282
    • Barak, B.1    Chaudhuri, K.2    Dwork, C.3    Kale, S.4    McSherry, F.5    Talwar, K.6
  • 2
    • 77949617188 scopus 로고    scopus 로고
    • Bounds on the sample complexity for private learning and private data release
    • Beimel, A., Kasiviswanathan, S. P., and Nissim, K. Bounds on the sample complexity for private learning and private data release. In TCC (2010), pp. 437-454.
    • (2010) TCC , pp. 437-454
    • Beimel, A.1    Kasiviswanathan, S.P.2    Nissim, K.3
  • 3
    • 84873351478 scopus 로고    scopus 로고
    • Characterizing the sample complexity of private learners
    • Beimel, A., Nissim, K., and Stemmer, U. Characterizing the sample complexity of private learners. In ITCS (2013), pp. 97-110.
    • (2013) ITCS , pp. 97-110
    • Beimel, A.1    Nissim, K.2    Stemmer, U.3
  • 4
    • 84885226635 scopus 로고    scopus 로고
    • Private learning and sanitization: Pure vs approximate differential privacy
    • Beimel, A., Nissim, K., and Stemmer, U. Private learning and sanitization: Pure vs. approximate differential privacy. In APPROX-RANDOM (2013), pp. 363-378.
    • (2013) Approx-Random , pp. 363-378
    • Beimel, A.1    Nissim, K.2    Stemmer, U.3
  • 5
    • 33244468835 scopus 로고    scopus 로고
    • Practical privacy: The SuLQ framework
    • Blum, A., Dwork, C., McSherry, F., and Nissim, K. Practical privacy: the SuLQ framework. In PODS (2005), pp. 128-138.
    • (2005) PODS , pp. 128-138
    • Blum, A.1    Dwork, C.2    McSherry, F.3    Nissim, K.4
  • 6
    • 57049136138 scopus 로고    scopus 로고
    • A learning theory approach to non-interactive database privacy
    • Blum, A., Ligett, K., and Roth, A. A learning theory approach to non-interactive database privacy. In STOC (2008), pp. 609-618.
    • (2008) STOC , pp. 609-618
    • Blum, A.1    Ligett, K.2    Roth, A.3
  • 9
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital data
    • Boneh, D., and Shaw, J. Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory 44, 5 (1998), 1897-1905.
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 11
    • 84858307870 scopus 로고    scopus 로고
    • Lower bounds in differential privacy
    • De, A. Lower bounds in differential privacy. In TCC (2012), pp. 321-338.
    • (2012) TCC , pp. 321-338
    • De, A.1
  • 12
    • 1142275486 scopus 로고    scopus 로고
    • Revealing information while preserving privacy
    • Dinur, I., and Nissim, K. Revealing information while preserving privacy. In PODS (2003), pp. 202-210.
    • (2003) PODS , pp. 202-210
    • Dinur, I.1    Nissim, K.2
  • 13
    • 33746037200 scopus 로고    scopus 로고
    • Our data, ourselves: Privacy via distributed noise generation
    • Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., and Naor, M. Our data, ourselves: Privacy via distributed noise generation. In EUROCRYPT (2006), pp. 486-503.
    • (2006) EUROCRYPT , pp. 486-503
    • Dwork, C.1    Kenthapadi, K.2    McSherry, F.3    Mironov, I.4    Naor, M.5
  • 14
    • 33745556605 scopus 로고    scopus 로고
    • Calibrating noise to sensitivity in private data analysis
    • Dwork, C., McSherry, F., Nissim, K., and Smith, A. Calibrating noise to sensitivity in private data analysis. In TCC (2006), pp. 265-284.
    • (2006) TCC , pp. 265-284
    • Dwork, C.1    McSherry, F.2    Nissim, K.3    Smith, A.4
  • 15
    • 35449000081 scopus 로고    scopus 로고
    • The price of privacy and the limits of lp decoding
    • Dwork, C., McSherry, F., and Talwar, K. The price of privacy and the limits of lp decoding. In STOC (2007), pp. 85-94.
    • (2007) STOC , pp. 85-94
    • Dwork, C.1    McSherry, F.2    Talwar, K.3
  • 16
    • 70350689921 scopus 로고    scopus 로고
    • On the complexity of differentially private data release: Efficient algorithms and hardness results
    • Dwork, C., Naor, M., Reingold, O., Rothblum, G. N., and Vadhan, S. P. On the complexity of differentially private data release: efficient algorithms and hardness results. In STOC (2009), pp. 381-390.
    • (2009) STOC , pp. 381-390
    • Dwork, C.1    Naor, M.2    Reingold, O.3    Rothblum, G.N.4    Vadhan, S.P.5
  • 18
    • 35048856104 scopus 로고    scopus 로고
    • Privacy-preserving datamining on vertically partitioned databases
    • Dwork, C., and Nissim, K. Privacy-preserving datamining on vertically partitioned databases. In CRYPTO (2004), pp. 528-544.
    • (2004) CRYPTO , pp. 528-544
    • Dwork, C.1    Nissim, K.2
  • 19
    • 78751522594 scopus 로고    scopus 로고
    • Boosting and differential privacy
    • Dwork, C., Rothblum, G. N., and Vadhan, S. P. Boosting and differential privacy. In FOCS (2010), pp. 51-60.
    • (2010) FOCS , pp. 51-60
    • Dwork, C.1    Rothblum, G.N.2    Vadhan, S.P.3
  • 20
    • 51849089628 scopus 로고    scopus 로고
    • New efficient attacks on statistical disclosure control mechanisms
    • Dwork, C., and Yekhanin, S. New efficient attacks on statistical disclosure control mechanisms. In CRYPTO (2008), pp. 469-480.
    • (2008) CRYPTO , pp. 469-480
    • Dwork, C.1    Yekhanin, S.2
  • 21
    • 79959740503 scopus 로고    scopus 로고
    • Privately releasing conjunctions and the statistical query barrier
    • Gupta, A., Hardt, M., Roth, A., and Ullman, J. Privately releasing conjunctions and the statistical query barrier. In STOC (2011), pp. 803-812.
    • (2011) STOC , pp. 803-812
    • Gupta, A.1    Hardt, M.2    Roth, A.3    Ullman, J.4
  • 22
    • 84863421549 scopus 로고    scopus 로고
    • Iterative constructions and private data release
    • Gupta, A., Roth, A., and Ullman, J. Iterative constructions and private data release. In TCC (2012), pp. 339-356.
    • (2013) TCC , pp. 339-356
    • Gupta, A.1    Roth, A.2    Ullman, J.3
  • 24
    • 84877755332 scopus 로고    scopus 로고
    • A simple and practical algorithm for differentially private data release
    • Hardt, M., Ligett, K., and McSherry, F. A simple and practical algorithm for differentially private data release. In NIPS (2012), pp. 2348-2356.
    • (2013) NIPS , pp. 2348-2356
    • Hardt, M.1    Ligett, K.2    McSherry, F.3
  • 25
    • 78751489078 scopus 로고    scopus 로고
    • A multiplicative weights mechanism for privacy-preserving data analysis
    • Hardt, M., and Rothblum, G. N. A multiplicative weights mechanism for privacy-preserving data analysis. In FOCS (2010), pp. 61-70.
    • (2010) FOCS , pp. 61-70
    • Hardt, M.1    Rothblum, G.N.2
  • 26
    • 77954711905 scopus 로고    scopus 로고
    • On the geometry of differential privacy
    • Hardt, M., and Talwar, K. On the geometry of differential privacy. In STOC (2010), pp. 705-714.
    • (2010) STOC , pp. 705-714
    • Hardt, M.1    Talwar, K.2
  • 27
    • 77954693385 scopus 로고    scopus 로고
    • The price of privately releasing contingency tables and the spectra of random matrices with correlated rows
    • Kasiviswanathan, S. P., Rudelson, M., Smith, A., and Ullman, J. The price of privately releasing contingency tables and the spectra of random matrices with correlated rows. In STOC (2010), pp. 775-784.
    • (2010) STOC , pp. 775-784
    • Kasiviswanathan, S.P.1    Rudelson, M.2    Smith, A.3    Ullman, J.4
  • 28
    • 84879826933 scopus 로고    scopus 로고
    • The geometry of differential privacy: The sparse and approximate cases
    • Nikolov, A., Talwar, K., and Zhang, L. The geometry of differential privacy: the sparse and approximate cases. In STOC (2013), pp. 351-360.
    • (2013) STOC , pp. 351-360
    • Nikolov, A.1    Talwar, K.2    Zhang, L.3
  • 29
    • 78149311849 scopus 로고    scopus 로고
    • Differential privacy and the fat-shattering dimension of linear queries
    • Roth, A. Differential privacy and the fat-shattering dimension of linear queries. In APPROX-RANDOM (2010), pp. 683-695.
    • (2010) Approx-Random , pp. 683-695
    • Roth, A.1
  • 30
    • 77954745685 scopus 로고    scopus 로고
    • Interactive privacy via the median mechanism
    • Roth, A., and Roughgarden, T. Interactive privacy via the median mechanism. In STOC (2010), pp. 765-774.
    • (2010) STOC , pp. 765-774
    • Roth, A.1    Roughgarden, T.2
  • 31
    • 43949123848 scopus 로고    scopus 로고
    • Optimal probabilistic fingerprint codes
    • Tardos, G. Optimal probabilistic fingerprint codes. J. ACM 55, 2 (2008).
    • (2008) J. ACM , vol.55 , pp. 2
    • Tardos, G.1
  • 32
    • 84879815183 scopus 로고    scopus 로고
    • Faster algorithms for privately releasing marginals
    • Thaler, J., Ullman, J., and Vadhan, S. P. Faster algorithms for privately releasing marginals. In ICALP (1) (2012), pp. 810-821.
    • (2012) ICALP , Issue.1 , pp. 810-821
    • Thaler, J.1    Ullman, J.2    Vadhan, S.P.3
  • 33
    • 84879825242 scopus 로고    scopus 로고
    • 2+o(1) counting queries with differential privacy is hard
    • Ullman, J. Answering n2+o(1) counting queries with differential privacy is hard. In STOC (2013), pp. 361-370.
    • (2013) STOC , pp. 361-370
    • Ullman, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.