On differential privacy and adaptive data analysis with bounded space
From MaRDI portal
Publication:6085262
DOI10.1007/978-3-031-30620-4_2zbMath1528.94096arXiv2302.05707OpenAlexW4365807224MaRDI QIDQ6085262
Itai Dinur, Uri Stemmer, David P. Woodruff, Samson Zhou
Publication date: 12 December 2023
Published in: Advances in Cryptology – EUROCRYPT 2023 (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/2302.05707
Authentication, digital signatures and secret sharing (94A62) General topics in the theory of data (68P01) Informational aspects of data analysis and big data (94A16)
Cites Work
- Unnamed Item
- Unnamed Item
- Leakage-resilient cryptography from minimal assumptions
- Random oracles and non-uniformity
- Non-uniform bounds in the random-permutation, ideal-cipher, and generic-group models
- Separation of the monotone NC hierarchy
- Towards defeating backdoored random oracles: indifferentiability with bounded adaptivity
- Super-linear time-memory trade-offs for symmetric encryption
- Preserving Statistical Validity in Adaptive Data Analysis
- Computational Differential Privacy
- Distributed Private Data Analysis: Simultaneously Solving How and What
- Random Oracles and Auxiliary Input
- A Leakage-Resilient Mode of Operation
- A Pseudorandom Generator from any One-way Function
- Deterministic Communication vs. Partition Number
- Collusion-secure fingerprinting for digital data
- Approximating rectangles by juntas and weakly-exponential lower bounds for LP relaxations of CSPs
- Algorithmic Stability for Adaptive Data Analysis
- Does learning require memorization? a short tale about a long tail
- On the complexity of differentially private data release
- Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali
- Private PAC learning implies finite Littlestone dimension
- Fingerprinting codes and the price of approximate differential privacy
- Answering n {2+o(1)} counting queries with differential privacy is hard
- Rectangles Are Nonnegative Juntas
- Theory of Cryptography
- Theory of Cryptography
- Optimal probabilistic fingerprint codes
- When is memorization of irrelevant training data necessary for high-accuracy learning?
This page was built for publication: On differential privacy and adaptive data analysis with bounded space