Computational Differential Privacy
From MaRDI portal
Publication:3183561
DOI10.1007/978-3-642-03356-8_8zbMath1252.94089OpenAlexW1493407996WikidataQ60547238 ScholiaQ60547238MaRDI QIDQ3183561
Ilya Mironov, Omer Reingold, Omkant Pandey, Salil P. Vadhan
Publication date: 20 October 2009
Published in: Advances in Cryptology - CRYPTO 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-03356-8_8
Related Items (18)
Limits on the usefulness of random oracles ⋮ Separating Computational and Statistical Differential Privacy in the Client-Server Model ⋮ Strong Hardness of Privacy from Weak Traitor Tracing ⋮ Efficient noise generation to achieve differential privacy with applications to secure multiparty computation ⋮ Secure random sampling in differential privacy ⋮ Comment ⋮ Channels of small log-ratio leakage and characterization of two-party differentially private computation ⋮ Completeness for symmetric two-party functionalities: revisited ⋮ Metric Pseudoentropy: Characterizations, Transformations and Applications ⋮ A theory of composition for differential obliviousness ⋮ On differential privacy and adaptive data analysis with bounded space ⋮ Differential privacy in probabilistic systems ⋮ Formal Verification of Differential Privacy for Interactive Systems (Extended Abstract) ⋮ Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources ⋮ Bounded privacy-utility monotonicity indicating bounded tradeoff of differential privacy mechanisms ⋮ Practical Fault-Tolerant Data Aggregation ⋮ Pufferfish ⋮ The Complexity of Differential Privacy
This page was built for publication: Computational Differential Privacy