Recent work has proposed a privacy framework, called Blowfish, that generalizes differential privacy in order to generate principled relaxations. Blowfish privacy definitions take as input an additional parameter called a policy graph, which specifies which properties about individuals should be hidden from an adversary. An open question is whether Blowfish privacy definitions indeed permit mechanisms that incur significant lower error for query answering compared to differentially privacy mechanism. In this paper, we answer this question and explore error bounds of sets of linear counting queries under different Blowfish policy graphs. We begin by generalizing the matrix mechanism lower bound of Li and Miklau (called the SVD bound) for dif...
In this article, we demonstrate that, ignoring computational constraints, it is possible to release ...
Differential privacy (DP) has gained significant attention lately as the state of the art in privacy...
In this article, we demonstrate that, ignoring computational constraints, it is possible to release ...
N.B. This is the full version of the conference paper pub-lished as [12]. This version includes an A...
Differential privacy is a robust privacy standard that has been successfully applied to a range of d...
Differential privacy is a robust privacy standard that has been successfully applied to a range of d...
N.B. This is the full version of the conference paper pub-lished as [12]. This version includes an A...
Differential privacy is a rigorous privacy condition achieved by randomizing query answers. This pap...
Differential privacy is a rigorous privacy condition achieved by randomizing query answers. This pap...
A common goal of privacy research is to release synthetic data that satisfies a formal privacy guara...
We propose a novel mechanism for answering sets of counting queries under differential privacy. Give...
We propose a novel mechanism for answering sets of count-ing queries under differential privacy. Giv...
Differential privacy is a promising privacy-preserving paradigm for statistical query processing ove...
Differential privacy is a promising privacy-preserving paradigm for statistical query processing ove...
Differential privacy is a promising privacy-preserving paradigm for statistical query processing ove...
In this article, we demonstrate that, ignoring computational constraints, it is possible to release ...
Differential privacy (DP) has gained significant attention lately as the state of the art in privacy...
In this article, we demonstrate that, ignoring computational constraints, it is possible to release ...
N.B. This is the full version of the conference paper pub-lished as [12]. This version includes an A...
Differential privacy is a robust privacy standard that has been successfully applied to a range of d...
Differential privacy is a robust privacy standard that has been successfully applied to a range of d...
N.B. This is the full version of the conference paper pub-lished as [12]. This version includes an A...
Differential privacy is a rigorous privacy condition achieved by randomizing query answers. This pap...
Differential privacy is a rigorous privacy condition achieved by randomizing query answers. This pap...
A common goal of privacy research is to release synthetic data that satisfies a formal privacy guara...
We propose a novel mechanism for answering sets of counting queries under differential privacy. Give...
We propose a novel mechanism for answering sets of count-ing queries under differential privacy. Giv...
Differential privacy is a promising privacy-preserving paradigm for statistical query processing ove...
Differential privacy is a promising privacy-preserving paradigm for statistical query processing ove...
Differential privacy is a promising privacy-preserving paradigm for statistical query processing ove...
In this article, we demonstrate that, ignoring computational constraints, it is possible to release ...
Differential privacy (DP) has gained significant attention lately as the state of the art in privacy...
In this article, we demonstrate that, ignoring computational constraints, it is possible to release ...