We show new lower bounds on the sample complexity of (ε, δ)-differentially private algorithms that accurately answer large sets of counting queries. A counting query on a database D ∈ ({0, 1}d)n has the form "What fraction of the individual records in the database satisfy the property q?" We show that in order to answer an arbitrary set Q of » nd counting queries on D to within error ±α it is necessary that [EQUATION] This bound is optimal up to poly-logarithmic factors, as demonstrated by the Private Multiplicative Weights algorithm (Hardt and Rothblum, FOCS'10). It is also the first to show that the sample complexity required for (ε, δ)-differential privacy is asymptotically larger than what is required merely for accuracy, which is O(log...
We study the problem of verifying differential privacy for loop-free programs with probabilistic cho...
Computing technologies today have made it much easier to gather personal data, ranging from GPS loca...
In this work, we study trade-offs between accuracy and privacy in the context of linear queries over...
We show new lower bounds on the sample complexity of (ε, δ)-differentially private algorithms that a...
In this thesis, we study when algorithmic tasks can be performed on sensitive data while protecting ...
As both the scope and scale of data collection increases, an increasingly large amount of sensitive ...
We prove new upper and lower bounds on the sample complexity of (ε, δ) differentially private algori...
We study the optimal sample complexity of a given workload of linear queries under the constraints o...
A central problem in differentially private data analysis is how to design efficient algorithms capa...
We present new theoretical results on differentially private data release useful with respect to any...
We study the problem of performing counting queries at different levels in hierarchical structures w...
A central challenge in differential privacy is to design computationally efficient non-interactive a...
Differential privacy is the now de facto industry standard for ensuring privacy while publicly relea...
In the study of differential privacy, composition theorems (starting with the original paper of Dwor...
peer reviewedAnalyses that fulfill differential privacy provide plausible deniability to individuals...
We study the problem of verifying differential privacy for loop-free programs with probabilistic cho...
Computing technologies today have made it much easier to gather personal data, ranging from GPS loca...
In this work, we study trade-offs between accuracy and privacy in the context of linear queries over...
We show new lower bounds on the sample complexity of (ε, δ)-differentially private algorithms that a...
In this thesis, we study when algorithmic tasks can be performed on sensitive data while protecting ...
As both the scope and scale of data collection increases, an increasingly large amount of sensitive ...
We prove new upper and lower bounds on the sample complexity of (ε, δ) differentially private algori...
We study the optimal sample complexity of a given workload of linear queries under the constraints o...
A central problem in differentially private data analysis is how to design efficient algorithms capa...
We present new theoretical results on differentially private data release useful with respect to any...
We study the problem of performing counting queries at different levels in hierarchical structures w...
A central challenge in differential privacy is to design computationally efficient non-interactive a...
Differential privacy is the now de facto industry standard for ensuring privacy while publicly relea...
In the study of differential privacy, composition theorems (starting with the original paper of Dwor...
peer reviewedAnalyses that fulfill differential privacy provide plausible deniability to individuals...
We study the problem of verifying differential privacy for loop-free programs with probabilistic cho...
Computing technologies today have made it much easier to gather personal data, ranging from GPS loca...
In this work, we study trade-offs between accuracy and privacy in the context of linear queries over...