2012
DOI: 10.1007/978-3-642-28914-9_19
|View full text |Cite
|
Sign up to set email alerts
|

Iterative Constructions and Private Data Release

Abstract: In this paper we study the problem of approximately releasing the cut function of a graph while preserving differential privacy, and give new algorithms (and new analyses of existing algorithms) in both the interactive and non-interactive settings.Our algorithms in the interactive setting are achieved by revisiting the problem of releasing differentially private, approximate answers to a large number of queries on a database. We show that several algorithms for this problem fall into the same basic framework, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
159
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 146 publications
(160 citation statements)
references
References 23 publications
1
159
0
Order By: Relevance
“…[GRU12]). Let X i , i ∈ [n] be IID random variables drawn from the Lap(b) (the Laplace distribution with parameter b) and let X = n i=1 X i .…”
Section: Probabilistic Toolsmentioning
confidence: 99%
“…[GRU12]). Let X i , i ∈ [n] be IID random variables drawn from the Lap(b) (the Laplace distribution with parameter b) and let X = n i=1 X i .…”
Section: Probabilistic Toolsmentioning
confidence: 99%
“…Our algorithm is based on a nested version of the Private Multiplicative Weights (PMW) algorithm of Hardt and Rothblum [15], which achieves the best parameters of any known stateful differentially private algorithm (using its analysis from [24]; a simpler proof appears in [25]):…”
Section: B the Analyst-private Mechanismmentioning
confidence: 99%
“…Each algorithm is taken from a different paper from the differential privacy literature (specifically, [4,18,19,27]). The first three algorithms rely on the following new feature that is enabled by DFuzz's dependent types:…”
Section: Case Studiesmentioning
confidence: 99%
“…A k-means program that performs a different number of iterations would have a different type. Worse, in Section 6, we will see several examples of practical algorithms whose types cannot be expressed in Fuzz, e.g., the IDC algorithm [19], in which the desired sensitivity is itself a parameter. This means that we cannot even add such operations to Fuzz as primitives.…”
Section: Propositionmentioning
confidence: 99%
See 1 more Smart Citation