- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources4
- Resource Type
-
0004000000000000
- More
- Availability
-
40
- Author / Contributor
- Filter by Author / Creator
-
-
Beimel, Amos (4)
-
Nissim, Kobbi (2)
-
Stemmer, Uri (2)
-
Alon, Noga (1)
-
Kaplan, Haim (1)
-
Korolova, Aleksandra (1)
-
Malkin, Tal (1)
-
Mansour, Yishay (1)
-
Mazor, Noam (1)
-
Moran, Shay (1)
-
Saranurak, Thatchaphol (1)
-
Sheffet, Or (1)
-
and Stemmer, Uri (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
& Abreu-Ramos, E. D. (0)
-
& Abramson, C. I. (0)
-
& Abreu-Ramos, E. D. (0)
-
& Adams, S.G. (0)
-
& Ahmed, K. (0)
-
- Filter by Editor
-
-
Reyzin, Leonid (1)
-
Smith, Adam D (1)
-
Stebila, Douglas (1)
-
Tauman Kalai, Yael (1)
-
Wichs, Daniel (1)
-
null (1)
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Reyzin, Leonid; Stebila, Douglas (Ed.)
-
Beimel, Amos; Kaplan, Haim; Mansour, Yishay; Nissim, Kobbi; Saranurak, Thatchaphol; Stemmer, Uri (, STOC 2022: Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing)
-
Alon, Noga; Beimel, Amos; Moran, Shay; and Stemmer, Uri (, Proceedings of Thirty Third Conference on Learning Theory)null (Ed.)
-
Beimel, Amos; Korolova, Aleksandra; Nissim, Kobbi; Sheffet, Or; Stemmer, Uri (, 1st Conference on Information-Theoretic Cryptography (ITC 2020))Tauman Kalai, Yael; Smith, Adam D; Wichs, Daniel (Ed.)Motivated by the desire to bridge the utility gap between local and trusted curator models of differential privacy for practical applications, we initiate the theoretical study of a hybrid model introduced by "Blender" [Avent et al., USENIX Security '17], in which differentially private protocols of n agents that work in the local-model are assisted by a differentially private curator that has access to the data of m additional users. We focus on the regime where m ≪ n and study the new capabilities of this (m,n)-hybrid model. We show that, despite the fact that the hybrid model adds no significant new capabilities for the basic task of simple hypothesis-testing, there are many other tasks (under a wide range of parameters) that can be solved in the hybrid model yet cannot be solved either by the curator or by the local-users separately. Moreover, we exhibit additional tasks where at least one round of interaction between the curator and the local-users is necessary - namely, no hybrid model protocol without such interaction can solve these tasks. Taken together, our results show that the combination of the local model with a small curator can become part of a promising toolkit for designing and implementing differential privacy.more » « less
An official website of the United States government

Full Text Available