Privacy-constrained source coding problems have become increasingly important recently, and the utility-privacy trade-off has been investigated for various systems. As pioneering work, Yamamoto (1983) found theoretical limits of the coding rate, privacy and utility in two cases; (i) both public and private information is encoded and (ii) only public information is encoded. However, the theoretical limit has not been characterized in a more general case; (iii) encoded messages consist of public information and a part of private information. Then in this paper, we characterize the trade-off relation in case (iii) using rate-distortion theory. The obtained expression of the achievable region is a "unified expression" because it includes the on...
A privacy mechanism design problem is studied through the lens of information theory. In this work, ...
We investigate the local differential privacy (LDP) guarantees of a randomized privacy mechanism via...
In this paper, we consider the setting in which the output of a differentially private mechanism is ...
An information theoretic privacy mechanism design problem for two scenarios is studied where the pri...
A privacy-utility tradeoff is developed for an arbitrary set of finite-alphabet source distributions...
The Internet is shaping our daily lives. On the one hand, social networks like Facebook and Twitter ...
We study the privacy-utility trade-off in data release under a rate constraint. An agent observes ra...
The pervasiveness of Internet of Things results in vast volumes of personal data generated by smart ...
The total variation distance is proposed as a privacy measure in an information disclosure scenario ...
The total variation distance is proposed as a privacy measure in an information disclosure scenario ...
The problem of private data disclosure is studied from an information theoretic perspective. Conside...
The purpose of Secure Multi-Party Computation is to enable protocol participants to compute a public...
Each agent in a network makes a local observation that is linearly related to a set of public and pr...
There is a long history of the study of information-theoretic privacy within the context of communic...
We consider a platform's problem of collecting data from privacy sensitive users to estimate an unde...
A privacy mechanism design problem is studied through the lens of information theory. In this work, ...
We investigate the local differential privacy (LDP) guarantees of a randomized privacy mechanism via...
In this paper, we consider the setting in which the output of a differentially private mechanism is ...
An information theoretic privacy mechanism design problem for two scenarios is studied where the pri...
A privacy-utility tradeoff is developed for an arbitrary set of finite-alphabet source distributions...
The Internet is shaping our daily lives. On the one hand, social networks like Facebook and Twitter ...
We study the privacy-utility trade-off in data release under a rate constraint. An agent observes ra...
The pervasiveness of Internet of Things results in vast volumes of personal data generated by smart ...
The total variation distance is proposed as a privacy measure in an information disclosure scenario ...
The total variation distance is proposed as a privacy measure in an information disclosure scenario ...
The problem of private data disclosure is studied from an information theoretic perspective. Conside...
The purpose of Secure Multi-Party Computation is to enable protocol participants to compute a public...
Each agent in a network makes a local observation that is linearly related to a set of public and pr...
There is a long history of the study of information-theoretic privacy within the context of communic...
We consider a platform's problem of collecting data from privacy sensitive users to estimate an unde...
A privacy mechanism design problem is studied through the lens of information theory. In this work, ...
We investigate the local differential privacy (LDP) guarantees of a randomized privacy mechanism via...
In this paper, we consider the setting in which the output of a differentially private mechanism is ...