Filters








13,089 Hits in 1.8 sec

Privacy with Imperfect Randomness [chapter]

Yevgeniy Dodis, Yanqing Yao
2015 Lecture Notes in Computer Science  
We revisit the impossibility of a variety of cryptographic tasks including privacy and differential privacy with imperfect randomness.  ...  Overall, we believe our results provide an intuitive, modular and unified picture elucidating the (im)possibility of privacy with general imperfect sources.  ...  Negative Results for Privacy with Imperfect Randomness.  ... 
doi:10.1007/978-3-662-48000-7_23 fatcat:xbj4pu6bdrgqrnfujqq4ygzvby

Differential Privacy with Imperfect Randomness [chapter]

Yevgeniy Dodis, Adriana López-Alt, Ilya Mironov, Salil Vadhan
2012 Lecture Notes in Computer Science  
This provides a somewhat surprising "separation" between traditional privacy and differential privacy with respect to imperfect randomness.  ...  ., Laplace mechanism) successfully utilized to achieve differential privacy with perfect randomness.  ...  In this work, we model perfect randomness with the uniform source and imperfect randomness with the γ-Santha-Vazirani source [21] , arguably the simplest type of a "non-extractable" source.  ... 
doi:10.1007/978-3-642-32009-5_29 fatcat:4ylymjcfqneehgsvgpx6mvtg2i

Differential Privacy:Dataset Privacy against any Adversary

José Cabrero-Holgueras
2021 Zenodo  
Differential privacy with imperfect randomness. In Annual Cryptology .  ...  Differential Privacy with Imperfect Randomness • Making a dataset DP often involves adding random noise. • If the randomness is imperfect, patterns can arise. • These patters permit reducing the noise  ... 
doi:10.5281/zenodo.5145513 fatcat:cqrwqv22rvfuddw5ejiydfwb2y

Differential Privacy:Dataset Privacy against any Adversary

José Cabrero-Holgueras
2021 Zenodo  
Differential privacy with imperfect randomness. In Annual Cryptology .  ...  NSCLC-Radiomics -The Cancer Imaging Archive (TCIA) Public Access Differential Privacy with Imperfect Randomness • Making a dataset DP often involves adding random noise. • If the randomness is imperfect  ... 
doi:10.5281/zenodo.5146225 fatcat:55gel5mctbg7td3zg2luysbw6q

Differential Privacy:Dataset Privacy against any Adversary

José Cabrero-Holgueras
2021 Zenodo  
NSCLC-Radiomics -The Cancer Imaging Archive (TCIA) Public Access Differential Privacy with Imperfect Randomness • Making a dataset DP often involves adding random noise. • If the randomness is imperfect  ...  Differential privacy with imperfect randomness. In Annual Cryptology Conference (pp. 497-516). Springer, Berlin, Heidelberg United States Alexis R. Santos-Lozada, Jeffrey T. Howard, Ashton M.  ...  Other interesting sources • I want to know more about DP without getting in detail: • Why differential privacy is awesome -Damien Desfontaines • Understanding differential privacy and why it matters for  ... 
doi:10.5281/zenodo.5155458 fatcat:6dsfjiantbapfadfbn5fes6fcq

Tagging idea in continuous variable quantum key distribution and its application [article]

Chenyang Li, Thomas Van Himbeeck, Li Qian, Hoi-Kwong Lo
2020 arXiv   pre-print
Finally, with this generic model and tagging idea, we can prove the security of continuous variable key distribution system with multiple imperfections.  ...  The idea of tagging is widely used in security proofs of discrete variable quantum key distribution with imperfect devices.  ...  B. continuous variable quantum key distribution with multiple imperfections With single generic imperfection model, we can now establish process for CV QKD with multiple imperfections.  ... 
arXiv:2010.03442v1 fatcat:fxfnnhqgkbfvngwmmp55rderku

Security of Key Distribution and Complementarity in Quantum Mechanics [chapter]

Masato Koashi
2010 Lecture Notes in Computer Science  
Eve) Encrypted communication of bits to correct Bob's sifted key to match with Alice's. 0 1 Z 0 1 Alice Eve Bob Z-basis setup X-basis setup 0 1 X 0 1 random bit random  ...  Bob's sifted key to match with Alice's.  ...  Whenever the secret key can be extracted with imperfection , the two tasks are feasible with imperfections as small as The complementarity approach is, in principle, applicable to any QKD scheme.  ... 
doi:10.1007/978-3-642-14496-7_3 fatcat:yblsl5nksvg4hm3npedrp45rny

Placing Conditional Disclosure of Secrets in the Communication Complexity Universe

Benny Applebaum, Prashant Nalini Vasudevan
2021 Journal of Cryptology  
Alice and Bob are allowed to send a single message to Carol which may depend on their inputs and some shared randomness, and the goal is to minimize the communication complexity while providing information-theoretic  ...  Notably, we show that allowing for imperfect correctness can significantly reduce communication -a seemingly new phenomenon in the context of information-theoretic cryptography.  ...  This general result leads to a polylogarithmic CDS protocol for NEQ n with imperfect privacy and imperfect correctness, providing a surprising separation between general imperfect CDS protocols and ones  ... 
doi:10.1007/s00145-021-09376-1 fatcat:a6kbdqw64vh4hhs4ra3pt4d2la

Privacy amplification of content identification systems based on fingerprint bit reliability

Sviatoslav Voloshynovskiy, Oleksiy Koval, Taras Holotyak, Fokko Beekhof, Farzad Farhadzadeh
2010 2010 IEEE International Workshop on Information Forensics and Security  
To avoid this privacy leak, privacy amplification is used.  ...  The analysis is performed for the case of perfect match between the side information shared between the encoder and decoder as well as for the case of imperfect side information.  ...  This approach is based on global privacy amplification, where all bits of stored fingerprint are randomized with the same probability disregarding their reliabilities.  ... 
doi:10.1109/wifs.2010.5711461 dblp:conf/wifs/VoloshynovskiyK10 fatcat:fadjvnc6abg7vgocpqbljxrsga

Does Imperfect Data Privacy Stop People from Collecting Personal Data?

Simeon Schudy, Verena Utikal
2018 Games  
centrally collected health data. 6 Imperfect Privacy may result for at least two reasons.  ...  Theory predicts that no data will be acquired with Disclosure Duty of collected data whereas Consent Law with perfect privacy results in complete information acquisition.  ...  never matching with an unknown type in Perfect Privacy and Imperfect Privacy).  ... 
doi:10.3390/g9010014 fatcat:d2yrjn2zwraevakrg6caupxi74

Wireless Information-Theoretic Security - Part II: Practical Implementation [article]

Matthieu Bloch, Joao Barros, Miguel R. D. Rodrigues, Steven W. McLaughlin
2006 arXiv   pre-print
The protocol uses a four-step procedure to secure communications: establish common randomness via an opportunistic transmission, perform message reconciliation, establish a common key via privacy amplification  ...  perfect and imperfect channel state information.  ...  : randomness sharing, information reconciliation, privacy amplification, secure communication.  ... 
arXiv:cs/0611121v1 fatcat:2gwzchjtoza77hcva3txd7wqye

A Gentle Introduction to Differential Privacy with Use Cases

José Cabrero-Holgueras
2021 Zenodo  
A gentle introduction to Differential Privacy as a small summary of how to understand it for non technical experts.  ...  Differential privacy with imperfect randomness. In Annual Cryptology Conference (pp. 497-516). Springer, Berlin, Heidelberg  ...  is awesome -Damien Desfontaines • Understanding differential privacy and why it matters for digital rights • Why do we need perfect randomness for Differential Privacy?  ... 
doi:10.5281/zenodo.5101323 fatcat:s7hxj2bcizccxhvaxaiaxy6rpa

A Gentle Introduction to Differential Privacy with Use Cases

José Cabrero-Holgueras
2021 Zenodo  
A gentle introduction to Differential Privacy as a small summary of how to understand it for non technical experts.  ...  Differential privacy with imperfect randomness. In Annual Cryptology Conference (pp. 497-516). Springer, Berlin, Heidelberg  ...  is awesome -Damien Desfontaines • Understanding differential privacy and why it matters for digital rights • Why do we need perfect randomness for Differential Privacy?  ... 
doi:10.5281/zenodo.5095316 fatcat:wddodaccqjfr3o5fa4m3vb6pse

Page 1845 of Mathematical Reviews Vol. , Issue 89C [page]

1989 Mathematical Reviews  
As an introduction to the problem we quote the summary: “We investigate how the use of a channel with perfect authenticity but no privacy can be used to repair the defects of a channel with imperfect privacy  ...  The authors summarize their ideas as follows: “To summarize, we investigate how the use of a channel with perfect authenticity but no privacy can be used to repair the defects of a channel with imperfect  ... 

Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources [chapter]

Michael Backes, Aniket Kate, Sebastian Meiser, Tim Ruffing
2015 Lecture Notes in Computer Science  
More concretely, we prove that indistinguishability with uniform randomness implies differential indistinguishability with weak randomness.  ...  Trying to ground cryptographic protocols on such imperfect, weaker sources of randomness has thus far mostly given rise to a multitude of impossibility results, including the impossibility to construct  ...  We would like to thank Jalaj Upadhyay for insightful discussions about randomness sources and differential privacy.  ... 
doi:10.1007/978-3-319-28166-7_33 fatcat:ahpzefndhngv7ikuf3yle572dq
« Previous Showing results 1 — 15 out of 13,089 results