Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Collecting and analyzing key-value data under shuffled differential privacy

  • Letter
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Balle B, Bell J, Gascón A, Nissim K. The privacy blanket of the shuffle model. In: Proceedings of the 39th Annual International Cryptology Conference on Advances in Cryptology. 2019, 638–667

  2. Gu X, Li M, Cheng Y, Xiong L, Cao Y. PCKV: locally differentially private correlated key-value data collection with optimized utility. In: Proceedings of the 29th USENIX Conference on Security Symposium. 2020, 55

  3. Bittau A, Erlingsson Ú, Maniatis P, Mironov I, Raghunathan A, Lie D, Rudominer M, Kode U, Tinnes J, Seefeld B. Prochlo: strong privacy for analytics in the crowd. In: Proceedings of the 26th Symposium on Operating Systems Principles. 2017, 441–459

  4. Wang S, Li J, Qian Y, Du J, Lin W, Yang W. Hiding numerical vectors in local private and shuffled messages. In: Proceedings of the 30th International Joint Conference on Artificial Intelligence. 2021, 3706–3712

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (Grant Nos. 61902365 and 61902366), and Open Project Program from Key Lab of Cryptologic Technology and Information Security, Ministry of Education, Shandong University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peng Tang.

Electronic Supplementary Material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, N., Zheng, W., Wang, Z. et al. Collecting and analyzing key-value data under shuffled differential privacy. Front. Comput. Sci. 17, 172606 (2023). https://doi.org/10.1007/s11704-022-1572-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11704-022-1572-0