Black-box separations for differentially private protocols
From MaRDI portal
Publication:2936620
DOI10.1007/978-3-662-45608-8_21zbMATH Open1315.94083OpenAlexW2162701360MaRDI QIDQ2936620FDOQ2936620
Authors: Dakshita Khurana, Hemanta K. Maji, Amit Sahai
Publication date: 6 January 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-45608-8_21
Recommendations
- Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols
- Do distributed differentially-private protocols require oblivious transfer?
- A Zero-One Law for Boolean Privacy
- Channels of small log-ratio leakage and characterization of two-party differentially private computation
- scientific article; zbMATH DE number 4191075
computational complexityrandom oracleblack-box separationdifferentially private protocolskey-agreement protocols
Cited In (4)
- Title not available (Why is that?)
- Computational Two-Party Correlation: A Dichotomy for Key-Agreement Protocols
- Channels of small log-ratio leakage and characterization of two-party differentially private computation
- Separating Computational and Statistical Differential Privacy in the Client-Server Model
This page was built for publication: Black-box separations for differentially private protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2936620)