Proceedings of the Twenty-Second ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems 2003
DOI: 10.1145/773153.773173
|View full text |Cite
|
Sign up to set email alerts
|

Revealing information while preserving privacy

Abstract: We examine the tradeoff between privacy and usability of statistical databases. We model a statistical database by an n-bit string d1, .., dn, with a query being a subset q ⊆ [n] to be answered by i∈q di. Our main result is a polynomial reconstruction algorithm of data from noisy (perturbed) subset sums. Applying this reconstruction algorithm to statistical databases we show that in order to achieve privacy one has to add perturbation of magnitude Ω( √ n). That is, smaller perturbation always results in a stro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

6
826
1
1

Year Published

2006
2006
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 798 publications
(834 citation statements)
references
References 28 publications
6
826
1
1
Order By: Relevance
“…We continue a line of research initiated in [10,11] on privacy in statistical databases. A statistic is a quantity computed from a sample.…”
Section: Introductionmentioning
confidence: 91%
See 4 more Smart Citations
“…We continue a line of research initiated in [10,11] on privacy in statistical databases. A statistic is a quantity computed from a sample.…”
Section: Introductionmentioning
confidence: 91%
“…Their definition is a special case of Definition 1 for input perturbation protocols of a limited form. A similar, more general definition was suggested in [10,11,6]. This was modeled after semantic security of encryptions.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations