A learning theory approach to non-interactive database privacy
STOC '08 Proceedings of the fortieth annual ACM symposium on Theory of computing
Composition attacks and auxiliary information in data privacy
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Distributed Private Data Analysis: Simultaneously Solving How and What
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
New Efficient Attacks on Statistical Disclosure Control Mechanisms
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
Verification servers: Enabling analysts to assess the quality of inferences from public use data
Computational Statistics & Data Analysis
Releasing search queries and clicks privately
Proceedings of the 18th international conference on World wide web
The Differential Privacy Frontier (Extended Abstract)
TCC '09 Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography
Universally utility-maximizing privacy mechanisms
Proceedings of the forty-first annual ACM symposium on Theory of computing
Proceedings of the forty-first annual ACM symposium on Theory of computing
Differential privacy and robust statistics
Proceedings of the forty-first annual ACM symposium on Theory of computing
On the complexity of differentially private data release: efficient algorithms and hardness results
Proceedings of the forty-first annual ACM symposium on Theory of computing
Privacy integrated queries: an extensible platform for privacy-preserving data analysis
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Trading in risk: using markets to improve access control
Proceedings of the 2008 workshop on New security paradigms
Proceedings of the 18th ACM conference on Information and knowledge management
Optimal random perturbation at multiple privacy levels
Proceedings of the VLDB Endowment
Asymptotically Optimal and Private Statistical Estimation
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Differential privacy with compression
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Differential privacy for collaborative security
Proceedings of the Third European Workshop on System Security
Towards publishing recommendation data with predictive anonymization
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Differential privacy: a survey of results
TAMC'08 Proceedings of the 5th international conference on Theory and applications of models of computation
An ad omnia approach to defining and achieving private data analysis
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
On the geometry of differential privacy
Proceedings of the forty-second ACM symposium on Theory of computing
Differential privacy under continual observation
Proceedings of the forty-second ACM symposium on Theory of computing
Interactive privacy via the median mechanism
Proceedings of the forty-second ACM symposium on Theory of computing
Proceedings of the forty-second ACM symposium on Theory of computing
Universally optimal privacy mechanisms for minimax agents
Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Towards an axiomatization of statistical privacy and utility
Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy integrated queries: an extensible platform for privacy-preserving data analysis
Communications of the ACM
Data mining with differential privacy
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Discovering frequent patterns in sensitive data
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Airavat: security and privacy for MapReduce
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
Breaking bidder collusion in large-scale spectrum auctions
Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing
Distance makes the types grow stronger: a calculus for differential privacy
Proceedings of the 15th ACM SIGPLAN international conference on Functional programming
A firm foundation for private data analysis
Communications of the ACM
Mapping the urban wireless landscape with Argos
Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems
Differential privacy in new settings
SODA '10 Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete Algorithms
Differentially private combinatorial optimization
SODA '10 Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete Algorithms
Differential privacy and the fat-shattering dimension of linear queries
APPROX/RANDOM'10 Proceedings of the 13th international conference on Approximation, and 14 the International conference on Randomization, and combinatorial optimization: algorithms and techniques
Differentially private data release through multidimensional partitioning
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
P4P: practical large-scale privacy-preserving distributed computation robust against malicious users
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Winner-imposing strategyproof mechanisms for multiple facility location games
WINE'10 Proceedings of the 6th international conference on Internet and network economics
Personalized social recommendations: accurate or private
Proceedings of the VLDB Endowment
Pan-private algorithms via statistics on sketches
Proceedings of the thirtieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
iReduct: differential privacy with reduced relative errors
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Proceedings of the 12th ACM conference on Electronic commerce
Privacy-preserving statistical estimation with optimal convergence rates
Proceedings of the forty-third annual ACM symposium on Theory of computing
An information theoretic approach for privacy metrics
Transactions on Data Privacy
Differentially private data release for data mining
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Differentially Private Empirical Risk Minimization
The Journal of Machine Learning Research
Compressive mechanism: utilizing sparse representation in differential privacy
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Proceedings of the 4th ACM workshop on Security and artificial intelligence
Formal Verification of Differential Privacy for Interactive Systems (Extended Abstract)
Electronic Notes in Theoretical Computer Science (ENTCS)
For sale : your data: by : you
Proceedings of the 10th ACM Workshop on Hot Topics in Networks
SIAM Journal on Computing
Approximately optimal mechanism design via differential privacy
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference
Probabilistic relational reasoning for differential privacy
POPL '12 Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Bounds on the sample complexity for private learning and private data release
TCC'10 Proceedings of the 7th international conference on Theory of Cryptography
A Practical Differentially Private Random Decision Tree Classifier
Transactions on Data Privacy
GUPT: privacy preserving data analysis made easy
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
Differential privacy in data publication and analysis
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
Unconditional differentially private mechanisms for linear queries
STOC '12 Proceedings of the forty-fourth annual ACM symposium on Theory of computing
Approximately optimal auctions for selling privacy when costs are correlated with data
Proceedings of the 13th ACM Conference on Electronic Commerce
Privacy-aware mechanism design
Proceedings of the 13th ACM Conference on Electronic Commerce
Iterative constructions and private data release
TCC'12 Proceedings of the 9th international conference on Theory of Cryptography
Integrating historical noisy answers for improving data utility under differential privacy
Proceedings of the 15th International Conference on Extending Database Technology
Differentially private summaries for sparse data
Proceedings of the 15th International Conference on Database Theory
Approximately strategy-proof voting
IJCAI'11 Proceedings of the Twenty-Second international joint conference on Artificial Intelligence - Volume Volume One
The application of differential privacy to health data
Proceedings of the 2012 Joint EDBT/ICDT Workshops
A differentially private estimator for the stochastic Kronecker graph model
Proceedings of the 2012 Joint EDBT/ICDT Workshops
Differentially-private learning and information theory
Proceedings of the 2012 Joint EDBT/ICDT Workshops
Buying private data at auction: the sensitive surveyor's problem
ACM SIGecom Exchanges
Differentially private transit data publication: a case study on the montreal transportation system
Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining
Keeping information safe from social networking apps
Proceedings of the 2012 ACM workshop on Workshop on online social networks
PrivBasis: frequent itemset mining with differential privacy
Proceedings of the VLDB Endowment
Low-rank mechanism: optimizing batch queries under differential privacy
Proceedings of the VLDB Endowment
Functional mechanism: regression analysis under differential privacy
Proceedings of the VLDB Endowment
Secure distributed framework for achieving ε-differential privacy
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Distributed private heavy hitters
ICALP'12 Proceedings of the 39th international colloquium conference on Automata, Languages, and Programming - Volume Part I
DJoin: differentially private join queries over distributed databases
OSDI'12 Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
Differentially private top-k query over MapReduce
Proceedings of the fourth international workshop on Cloud data management
Differentially private projected histograms: construction and use for prediction
ECML PKDD'12 Proceedings of the 2012 European conference on Machine Learning and Knowledge Discovery in Databases - Volume Part II
BLIP: non-interactive differentially-private similarity computation on bloom filters
SSS'12 Proceedings of the 14th international conference on Stabilization, Safety, and Security of Distributed Systems
Worst- and average-case privacy breaches in randomization mechanisms
TCS'12 Proceedings of the 7th IFIP TC 1/WG 202 international conference on Theoretical Computer Science
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Empirical evaluation of statistical inference from differentially-private contingency tables
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
Is privacy compatible with truthfulness?
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
Characterizing the sample complexity of private learners
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
Non-interactive differential privacy: a survey
Proceedings of the First International Workshop on Open Data
Linear dependent types for differential privacy
POPL '13 Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Privacy by design: a formal framework for the analysis of architectural choices
Proceedings of the third ACM conference on Data and application security and privacy
Winner-imposing strategyproof mechanisms for multiple Facility Location games
Theoretical Computer Science
Bayesian mechanism design with efficiency, privacy, and approximate truthfulness
WINE'12 Proceedings of the 8th international conference on Internet and Network Economics
Privacy auctions for recommender systems
WINE'12 Proceedings of the 8th international conference on Internet and Network Economics
Take it or leave it: running a survey when privacy comes at a cost
WINE'12 Proceedings of the 8th international conference on Internet and Network Economics
Differential private trajectory protection of moving objects
Proceedings of the Third ACM SIGSPATIAL International Workshop on GeoStreaming
A propagation model for provenance views of public/private workflows
Proceedings of the 16th International Conference on Database Theory
On optimal differentially private mechanisms for count-range queries
Proceedings of the 16th International Conference on Database Theory
A learning theory approach to noninteractive database privacy
Journal of the ACM (JACM)
A privacy framework: indistinguishable privacy
Proceedings of the Joint EDBT/ICDT 2013 Workshops
Information preservation in statistical privacy and bayesian estimation of unattributed histograms
Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data
PrivGene: differentially private model fitting using genetic algorithms
Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data
Information-Theoretic foundations of differential privacy
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
Truthful mechanisms for agents that value privacy
Proceedings of the fourteenth ACM conference on Electronic commerce
Privacy and coordination: computing on databases with endogenous participation
Proceedings of the fourteenth ACM conference on Electronic commerce
Multi-parameter mechanisms with implicit payment computation
Proceedings of the fourteenth ACM conference on Electronic commerce
Publishing trajectories with differential privacy guarantees
Proceedings of the 25th International Conference on Scientific and Statistical Database Management
Mining frequent graph patterns with differential privacy
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-preserving data exploration in genome-wide association studies
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
Practical differential privacy via grouping and smoothing
Proceedings of the VLDB Endowment
Beyond worst-case analysis in private singular vector computation
Proceedings of the forty-fifth annual ACM symposium on Theory of computing
Differential privacy for the analyst via private equilibrium computation
Proceedings of the forty-fifth annual ACM symposium on Theory of computing
Probabilistic Relational Reasoning for Differential Privacy
ACM Transactions on Programming Languages and Systems (TOPLAS)
Differential privacy for neighborhood-based collaborative filtering
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Differential privacy for functions and functional data
The Journal of Machine Learning Research
ACM SIGecom Exchanges
Membership privacy: a unifying framework for privacy definitions
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
DiffR-Tree: a differentially private spatial index for OLAP query
WAIM'13 Proceedings of the 14th international conference on Web-Age Information Management
Mining frequent patterns with differential privacy
Proceedings of the VLDB Endowment
Mechanism design in large games: incentives and privacy
Proceedings of the 5th conference on Innovations in theoretical computer science
Redrawing the boundaries on purchasing data from privacy-sensitive individuals
Proceedings of the 5th conference on Innovations in theoretical computer science
A near-optimal algorithm for differentially-private principal components
The Journal of Machine Learning Research
Distributed and Parallel Databases
Journal of Computer Security
Hi-index | 0.03 |
We study the role that privacy-preserving algorithms, which prevent the leakage of specific information about participants, can play in the design of mechanisms for strategic agents, which must encourage players to honestly report information. Specifically, we show that the recent notion of differential privacy [15, 14], in addition to its own intrinsic virtue, can ensure that participants have limited effect on the outcome of the mechanism, and as a consequence have limited incentive to lie. More precisely, mechanisms with differential privacy are approximate dominant strategy under arbitrary player utility functions, are automatically resilient to coalitions, and easily allow repeatability. We study several special cases of the unlimited supply auction problem, providing new results for digital goods auctions, attribute auctions, and auctions with arbitrary structural constraints on the prices. As an important prelude to developing a privacy-preserving auction mechanism, we introduce and study a generalization of previous privacy work that accommodates the high sensitivity of the auction setting, where a single participant may dramatically alter the optimal fixed price, and a slight change in the offered price may take the revenue from optimal to zero.