Proceedings of the Forty-Fourth Annual ACM Symposium on Theory of Computing 2012
DOI: 10.1145/2213977.2214089
|View full text |Cite
|
Sign up to set email alerts
|

Unconditional differentially private mechanisms for linear queries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
64
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 48 publications
(65 citation statements)
references
References 30 publications
1
64
0
Order By: Relevance
“…Brenner and Nissim [9] showed that such universally optimal private mechanisms do not exist for two counting queries or for a single non-binary sum query. As mentioned above, Hardt and Talwar [32], and Bhaskara et al [5] gave relative guarantees for multi-dimensional queries under pure privacy with respect to total squared error. De [13] unified and strengthened these bounds and showed stronger lower bounds for the class of non-linear low sensitivity queries.…”
Section: Related Workmentioning
confidence: 95%
See 3 more Smart Citations
“…Brenner and Nissim [9] showed that such universally optimal private mechanisms do not exist for two counting queries or for a single non-binary sum query. As mentioned above, Hardt and Talwar [32], and Bhaskara et al [5] gave relative guarantees for multi-dimensional queries under pure privacy with respect to total squared error. De [13] unified and strengthened these bounds and showed stronger lower bounds for the class of non-linear low sensitivity queries.…”
Section: Related Workmentioning
confidence: 95%
“…This is similar to the approach in [5,32] but we use the minimum volume enclosing ellipsoid, rather than the M -ellipsoid used in those works, to facilitate the decomposition process. This allows us to handle the approximate and the sparse cases.…”
Section: Theoremmentioning
confidence: 99%
See 2 more Smart Citations
“…Other approaches [41,42] used convex geometry to devise differentially private mechanisms and upper/lower bounds for query workloads. These schemes were based on the exponential mechanism.…”
Section: ) Linear Counting Queriesmentioning
confidence: 99%