Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing 2009
DOI: 10.1145/1536414.1536467
|View full text |Cite
|
Sign up to set email alerts
|

On the complexity of differentially private data release

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
285
0
2

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 311 publications
(288 citation statements)
references
References 20 publications
1
285
0
2
Order By: Relevance
“…Also, for fixed ∆(f ), the smaller ε, the more Laplace noise is added: when ε is very small, Definition 1 almost requires that the probabilities on both sides of Equation (1) be equal, which requires the randomized function κ(·) = f (·) + Y (·) to yield very similar results for all pairs of neighbor data sets; adding a lot of noise is a way to achieve this. Differential privacy was also proposed for the non-interactive setting in [27,28,29,30]. Even though a non-interactive data release can be used to answer an arbitrarily large number of queries, in all these proposals, this is obtained at the cost of offering utility guarantees only for a restricted class of queries [27], typically count queries.…”
Section: Definition 1 (ε-Differential Privacy)mentioning
confidence: 99%
See 1 more Smart Citation
“…Also, for fixed ∆(f ), the smaller ε, the more Laplace noise is added: when ε is very small, Definition 1 almost requires that the probabilities on both sides of Equation (1) be equal, which requires the randomized function κ(·) = f (·) + Y (·) to yield very similar results for all pairs of neighbor data sets; adding a lot of noise is a way to achieve this. Differential privacy was also proposed for the non-interactive setting in [27,28,29,30]. Even though a non-interactive data release can be used to answer an arbitrarily large number of queries, in all these proposals, this is obtained at the cost of offering utility guarantees only for a restricted class of queries [27], typically count queries.…”
Section: Definition 1 (ε-Differential Privacy)mentioning
confidence: 99%
“…Moreover, since many works on differential privacy focus on preserving the utility of counting queries [35,31,32,27,28,29,30], we measured how the methods preserve the data distribution by building histograms of each attribute and comparing the distribution between the original and masked values according to the well-known Jensen-Shannon divergence (JSD) [56], which is symmetric and bounded in the 0..1 range. At a data set level, we averaged the divergence of all the attributes.…”
Section: Evaluation Measures and Experimentsmentioning
confidence: 99%
“…The first cryptographic tool we need in our construction is 2-message witness indistinguishable proofs for NP ("zaps") [FS90,DN07] in the plain model (with no common reference string). Consider a language L ∈ NP.…”
Section: Zaps (2-message Wi Proofs)mentioning
confidence: 99%
“…Every language in NP has an extractable zap proof system (P, V, E), as defined in Definition 6, if there exists non-interactive zero-knowledge proofs of knowledge for NP [DN07].…”
Section: Zaps (2-message Wi Proofs)mentioning
confidence: 99%
See 1 more Smart Citation