The algorithmic foundations of differential privacy

C Dwork, A Roth - Foundations and Trends® in Theoretical …, 2014 - nowpublishers.com
The problem of privacy-preserving data analysis has a long history spanning multiple
disciplines. As electronic data about individuals becomes increasingly detailed, and as …

The complexity of differential privacy

S Vadhan - Tutorials on the Foundations of Cryptography …, 2017 - Springer
Differential privacy is a theoretical framework for ensuring the privacy of individual-level data
when performing statistical analysis of privacy-sensitive datasets. This tutorial provides an …

Protecting locations with differential privacy under temporal correlations

Y **ao, L **ong - Proceedings of the 22nd ACM SIGSAC conference on …, 2015 - dl.acm.org
Concerns on location privacy frequently arise with the rapid development of GPS enabled
devices and location-based applications. While spatial transformation techniques such as …

An economic analysis of privacy protection and statistical accuracy as social choices

JM Abowd, IM Schmutte - American Economic Review, 2019 - aeaweb.org
Statistical agencies face a dual mandate to publish accurate statistics while protecting
respondent privacy. Increasing privacy protection requires decreased accuracy …

Differentially private release and learning of threshold functions

M Bun, K Nissim, U Stemmer… - 2015 IEEE 56th Annual …, 2015 - ieeexplore.ieee.org
We prove new upper and lower bounds on the sample complexity of (ε, δ) differentially
private algorithms for releasing approximate answers to threshold functions. A threshold …

Optimizing error of high-dimensional statistical queries under differential privacy

R McKenna, G Miklau, M Hay… - arxiv preprint arxiv …, 2018 - arxiv.org
Differentially private algorithms for answering sets of predicate counting queries on a
sensitive database have many applications. Organizations that collect individual-level data …

The geometry of differential privacy: the sparse and approximate cases

A Nikolov, K Talwar, L Zhang - Proceedings of the forty-fifth annual ACM …, 2013 - dl.acm.org
We study trade-offs between accuracy and privacy in the context of linear queries over
histograms. This is a rich class of queries that includes contingency tables and range …

Iterative constructions and private data release

A Gupta, A Roth, J Ullman - Theory of Cryptography: 9th Theory of …, 2012 - Springer
In this paper we study the problem of approximately releasing the cut function of a graph
while preserving differential privacy, and give new algorithms (and new analyses of existing …

Almost tight error bounds on differentially private continual counting

M Henzinger, J Upadhyay, S Upadhyay - … of the 2023 Annual ACM-SIAM …, 2023 - SIAM
The first large-scale deployment of private federated learning uses differentially private
counting in the continual release model as a subroutine (Google AI blog titled “Federated …

The structure of optimal private tests for simple hypotheses

CL Canonne, G Kamath, A McMillan, A Smith… - Proceedings of the 51st …, 2019 - dl.acm.org
Hypothesis testing plays a central role in statistical inference, and is used in many settings
where privacy concerns are paramount. This work answers a basic question about privately …