On the complexity of differentially private data release: efficient algorithms and hardness results

@inproceedings{Dwork2009OnTC,
  title={On the complexity of differentially private data release: efficient algorithms and hardness results},
  author={C. Dwork and M. Naor and O. Reingold and G. N. Rothblum and S. Vadhan},
  booktitle={STOC '09},
  year={2009}
}
  • C. Dwork, M. Naor, +2 authors S. Vadhan
  • Published in STOC '09 2009
  • Computer Science
  • We consider private data analysis in the setting in which a trusted and trustworthy curator, having obtained a large data set containing private information, releases to the public a "sanitization" of the data set that simultaneously protects the privacy of the individual contributors of data and offers utility to the data analyst. The sanitization may be in the form of an arbitrary data structure, accompanied by a computational procedure for determining approximate answers to queries on the… CONTINUE READING
    308 Citations
    Optimal error of query sets under the differentially-private matrix mechanism
    • 34
    • PDF
    Lower Bounds on the Error of Query Sets Under the Differentially-Private Matrix Mechanism
    • 2
    • PDF
    Private data release via learning thresholds
    • 49
    • PDF
    A Multiplicative Weights Mechanism for Privacy-Preserving Data Analysis
    • 331
    • PDF
    Faster Algorithms for Privately Releasing Marginals
    • 37
    • PDF
    Iterative Constructions and Private Data Release
    • 161
    • PDF
    Utility-preserving differentially private data releases via individual ranking microaggregation
    • 45
    • PDF
    Distributed Private Data Analysis: On Simultaneously Solving How and What
    • 137
    • PDF

    References

    SHOWING 1-4 OF 4 REFERENCES
    Mechanism Design via Differential Privacy
    • F. McSherry, Kunal Talwar
    • Computer Science
    • 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07)
    • 2007
    • 1,539
    • Highly Influential
    • PDF
    Revealing information while preserving privacy
    • 875
    • Highly Influential
    • PDF
    Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
    • 294
    • Highly Influential
    • PDF
    Self Protecting Pirates and Black-Box Traitor Tracing
    • 1,137
    • Highly Influential
    • PDF