Channels of small log-ratio leakage and characterization of two-party differentially private computation
From MaRDI portal
Publication:2175926
DOI10.1007/978-3-030-36030-6_21zbMath1455.94162arXiv2105.00770OpenAlexW2990754393MaRDI QIDQ2175926
Iftach Haitner, Jad Silbak, Ronen Shaltiel, Noam Mazor
Publication date: 30 April 2020
Full work available at URL: https://arxiv.org/abs/2105.00770
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Network protocols (68M12) Channel models (including quantum) in information and communication theory (94A40)
Related Items (2)
Channels of small log-ratio leakage and characterization of two-party differentially private computation ⋮ Computational Two-Party Correlation: A Dichotomy for Key-Agreement Protocols
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Limits on the usefulness of random oracles
- Completeness in two-party secure computation: A computational view
- Channels of small log-ratio leakage and characterization of two-party differentially private computation
- Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols
- Optimal Lower Bound for Differentially Private Multi-party Aggregation
- Randomized Response: A Survey Technique for Eliminating Evasive Answer Bias
- Black-Box Separations for Differentially Private Protocols
- Assisted Common Information With an Application to Secure Two-Party Sampling
- Computational Differential Privacy
- On the Power of the Randomized Iterate
- An Efficient Parallel Repetition Theorem
- Distributed Private Data Analysis: Simultaneously Solving How and What
- A Framework for Efficient and Composable Oblivious Transfer
- On the Oblivious-Transfer Capacity of Noisy Resources
- Oblivious Transfer from Weak Noisy Channels
- Secret key agreement by public discussion from common information
- On the Existence of Pseudorandom Generators
- Do Distributed Differentially-Private Protocols Require Oblivious Transfer?
- Foundations of Cryptography
- Generalized privacy amplification
- Computational Two-Party Correlation: A Dichotomy for Key-Agreement Protocols
- Smooth Projective Hashing and Two-Message Oblivious Transfer
- A Parallel Repetition Theorem for Any Interactive Argument
- Oblivious-Transfer Amplification
- Theory of Cryptography
- Theory of Cryptography
- Theory of Cryptography
This page was built for publication: Channels of small log-ratio leakage and characterization of two-party differentially private computation