2020
DOI: 10.48550/arxiv.2004.09481
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Connecting Robust Shuffle Privacy and Pan-Privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…In general, if each node over G p has at least one trustful neighbor, the privacy of the nodes will have further guarantee in terms of identifiability of β i (0), i ∈ V from β i (S), i ∈ V in the presence of malicious nodes. Therefore, the structure of G p would enable stronger internal privacy preservation that goes beyond Theorem 1, due to the shuffling effect [35,36] that comes along the PPSC procedure. We leave a quantitive analysis for this PPSC enabled internal privacy protection in future works since it is not fully aligning with the scope of the current paper.…”
Section: Discussion: Privacy Within the Private Graphmentioning
confidence: 99%
See 2 more Smart Citations
“…In general, if each node over G p has at least one trustful neighbor, the privacy of the nodes will have further guarantee in terms of identifiability of β i (0), i ∈ V from β i (S), i ∈ V in the presence of malicious nodes. Therefore, the structure of G p would enable stronger internal privacy preservation that goes beyond Theorem 1, due to the shuffling effect [35,36] that comes along the PPSC procedure. We leave a quantitive analysis for this PPSC enabled internal privacy protection in future works since it is not fully aligning with the scope of the current paper.…”
Section: Discussion: Privacy Within the Private Graphmentioning
confidence: 99%
“…Recent advances on gossiping protocols include new privacy-preserving gossip algorithms [34]. On the other hand, the idea of shuffling data for differential privacy is also studied in [35,36], where each agent randomizes its own local data, and then submits the resulting randomized data to a secure shuffler for random permutation before being public for computation purpose. In such a protocol, a central shuffler is needed, and as in the previous differentially private computing protocols, it leads to a trade-off between the privacy and accuracy.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation