On the complexity of differentially private data release

From MaRDI portal
Revision as of 15:43, 8 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5172732

DOI10.1145/1536414.1536467zbMath1304.94050OpenAlexW2124612670MaRDI QIDQ5172732

Guy N. Rothblum, Cynthia Dwork, Omer Reingold, Moni Naor, Salil P. Vadhan

Publication date: 4 February 2015

Published in: Proceedings of the forty-first annual ACM symposium on Theory of computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/1536414.1536467




Related Items (only showing first 100 items - show all)

Lower bounds on the error of query sets under the differentially-private matrix mechanismOn the measurement complexity of differentially private query answeringAn Improved Private Mechanism for Small DatabasesInapproximability for Antiferromagnetic Spin Systems in the Tree Nonuniqueness RegionCommunication is Bounded by Root of RankAre Lock-Free Concurrent Algorithms Practically Wait-Free?Robust Protocols for Securely Expanding Randomness and Distributing Keys Using Untrusted Quantum DevicesThe Power of Localization for Efficiently Learning Linear Separators with NoiseSeparating Computational and Statistical Differential Privacy in the Client-Server ModelStrong Hardness of Privacy from Weak Traitor TracingPrivacy and Truthful Equilibrium Selection for Aggregative GamesFingerprinting Codes and the Price of Approximate Differential PrivacyEfficient and secure outsourcing of differentially private data publicationModel averaging with privacy-preservingMultiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationSuper-Polylogarithmic Hypergraph Coloring Hardness via Low-Degree Long CodesAn Almost-Optimally Fair Three-Party Coin-Flipping ProtocolOptimal CUR Matrix DecompositionsEXPONENTIAL IMPROVEMENT IN PRECISION FOR SIMULATING SPARSE HAMILTONIANSThe average sensitivity of an intersection of half spacesConcurrent composition of differential privacyCollusion Resistant Traitor Tracing from Learning with ErrorsNew algorithms and lower bounds for circuits with linear threshold gatesOptimal data-independent noise for differential privacyDeciding First-Order Properties of Nowhere Dense GraphsThe Matching Polytope has Exponential Extension ComplexityBounds on the sample complexity for private learning and private data releaseEconomic efficiency requires interactionOrder-Revealing Encryption and the Hardness of Private LearningAnswering $n^2+o(1)$ Counting Queries with Differential Privacy is HardThe Geometry of Differential Privacy: The Small Database and Approximate CasesSegmentation, Incentives, and PrivacyOn the power of multiple anonymous messages: frequency estimation and selection in the shuffle model of differential privacyWhat Can We Learn Privately?Bounds on the Sample Complexity for Private Learning and Private Data ReleaseFingerprinting codes and the price of approximate differential privacyAnalyze gaussPrivate matchings and allocationsRounding sum-of-squares relaxationsConstant factor approximation for balanced cut in the PIE modelEntropy, optimization and countingPolynomial bounds for the grid-minor theoremAn excluded half-integral grid theorem for digraphs and the directed disjoint paths problemCops, robbers, and threatening skeletonsPseudorandom generators with optimal seed length for non-boolean poly-size circuitsOn derandomizing algorithms that err extremely rarelySuper-polynomial lower bounds for depth-4 homogeneous arithmetic formulasLower bounds for depth 4 formulas computing iterated matrix multiplicationThe limits of depth reduction for arithmetic formulasA super-polynomial lower bound for regular arithmetic formulasA characterization of locally testable affine-invariant properties via decomposition theoremsL p -testingTurnstile streaming algorithms might as well be linear sketchesLinear time construction of compressed text indices in compact spaceFormulas vs. circuits for small distance connectivityToward better formula lower boundsBreaking the minsky-papert barrier for constant-depth circuitsThe sample complexity of revenue maximizationOptimal competitive auctionsHomological product codesA quantum algorithm for computing the unit group of an arbitrary degree number fieldPrimal beats dual on online packing LPs in the random-order modelCompetitive algorithms from competitive equilibriaMinimum bisection is fixed parameter tractableAn efficient parallel solver for SDD linear systemsSolving SDD linear systems in nearly m log 1/2 n timeFrom hierarchical partitions to hierarchical coversShortest paths on polyhedral surfaces and terrainsEmbedding and canonizing graphs of bounded genus in logspaceTesting surface area with arbitrary accuracyCoin flipping of any constant bias implies one-way functionsInfinite randomness expansion with a constant number of devicesFrom average case complexity to improper learning complexityBandits with switching costsOnline local learning via semidefinite programmingHow to use indistinguishability obfuscationHow to delegate computationsCircuits resilient to additive attacks with applications to secure computationOn the existence of extractable one-way functionsBlack-box non-black-box zero knowledgeDichotomies in equilibrium computation, and complementary pivot algorithms for a new class of non-separable utility functionsQuery complexity of approximate nash equilibriaConstant rank bimatrix games are PPAD-hardApproximation algorithms for bipartite matching with metric and geometric costsDistributed approximation algorithms for weighted shortest pathsParallel algorithms for geometric graph problemsFourier PCA and robust tensor decompositionSmoothed analysis of tensor decompositionsEfficient density estimation via piecewise polynomial approximationAnalytical approach to parallel repetitionA characterization of strong approximation resistanceA strongly polynomial algorithm for generalized flow maximizationApproximate distance oracles with constant query timeFaster all-pairs shortest paths via circuit complexitySublinear-time decremental algorithms for single-source reachability and shortest paths on directed graphsZig-zag sortCommunity detection thresholds and the weak Ramanujan propertyDistributed computability in Byzantine asynchronous systemsThe Complexity of Differential PrivacyEfficient algorithms for privately releasing marginals via convex relaxations







This page was built for publication: On the complexity of differentially private data release