Separating Computational and Statistical Differential Privacy in the Client-Server Model
From MaRDI portal
Publication:3179372
DOI10.1007/978-3-662-53641-4_23zbMath1406.94029OpenAlexW2534727109MaRDI QIDQ3179372
Mark Bun, Yi-Hsiu Chen, Salil P. Vadhan
Publication date: 21 December 2016
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: http://nrs.harvard.edu/urn-3:HUL.InstRepos:28235738
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- The Complexity of Computing the Optimal Composition of Differential Privacy
- Order-Revealing Encryption and the Hardness of Private Learning
- Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols
- Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
- Black-Box Separations for Differentially Private Protocols
- PCPs and the Hardness of Generating Private Synthetic Data
- Limits of Computational Differential Privacy in the Client/Server Setting
- What Can We Learn Privately?
- Computational Differential Privacy
- Resettable zero-knowledge (extended abstract)
- Our Data, Ourselves: Privacy Via Distributed Noise Generation
- Distributed Private Data Analysis: Simultaneously Solving How and What
- Multiple NonInteractive Zero Knowledge Proofs Under General Assumptions
- Do Distributed Differentially-Private Protocols Require Oblivious Transfer?
- Privacy-Preserving Stream Aggregation with Fault Tolerance
- Foundations of Cryptography
- Limits on the Usefulness of Random Oracles
- Differential privacy and robust statistics
- On the complexity of differentially private data release
- ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation
- New Techniques for Noninteractive Zero-Knowledge
- Zaps and Their Applications
- Answering n {2+o(1)} counting queries with differential privacy is hard
- Theory of Cryptography
This page was built for publication: Separating Computational and Statistical Differential Privacy in the Client-Server Model