2019 IEEE International Symposium on Information Theory (ISIT) 2019
DOI: 10.1109/isit.2019.8849440
|View full text |Cite
|
Sign up to set email alerts
|

Information-Theoretic Privacy Watchdogs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
41
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(42 citation statements)
references
References 11 publications
1
41
0
Order By: Relevance
“…However, such data also contains sensitive information about individuals or businesses, which makes the privacy regulators, users, and data providers concerned about the leakage of confidential information, either explicitly or implicitly. In signal processing and information theory, data privacy is underpinned in terms of a measure called information lift [1,2].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…However, such data also contains sensitive information about individuals or businesses, which makes the privacy regulators, users, and data providers concerned about the leakage of confidential information, either explicitly or implicitly. In signal processing and information theory, data privacy is underpinned in terms of a measure called information lift [1,2].…”
Section: Introductionmentioning
confidence: 99%
“…It is clear that a small lift indicates limited private information gain by the adversary and therefore the more private X is. The lift is the elementary measure in almost all information leakage measures, e.g., mutual information [1,3], Sibson mutual information [4][5][6], α-leakage [7] and local differential privacy [8,9]: as proved in [2], if lift is bounded, all these leakage measures are also bounded.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…1 The relationship between information-theoretic DP and local DP (LDP) [5] with other notions of informationtheoretic privacy have been studied. These include conditional mutual information [6] and maximal leakage [7], which are under worst-case source distribution, as well as mutual information [8] and ǫ-log-lift (also known as ǫ-information-privacy or information density) [9]- [11], which assume a given source distribution.…”
Section: Introductionmentioning
confidence: 99%