References
Balle B, Bell J, Gascón A, Nissim K. The privacy blanket of the shuffle model. In: Proceedings of the 39th Annual International Cryptology Conference on Advances in Cryptology. 2019, 638–667
Gu X, Li M, Cheng Y, Xiong L, Cao Y. PCKV: locally differentially private correlated key-value data collection with optimized utility. In: Proceedings of the 29th USENIX Conference on Security Symposium. 2020, 55
Bittau A, Erlingsson Ú, Maniatis P, Mironov I, Raghunathan A, Lie D, Rudominer M, Kode U, Tinnes J, Seefeld B. Prochlo: strong privacy for analytics in the crowd. In: Proceedings of the 26th Symposium on Operating Systems Principles. 2017, 441–459
Wang S, Li J, Qian Y, Du J, Lin W, Yang W. Hiding numerical vectors in local private and shuffled messages. In: Proceedings of the 30th International Joint Conference on Artificial Intelligence. 2021, 3706–3712
Acknowledgements
This work was supported by the National Natural Science Foundation of China (Grant Nos. 61902365 and 61902366), and Open Project Program from Key Lab of Cryptologic Technology and Information Security, Ministry of Education, Shandong University.
Author information
Authors and Affiliations
Corresponding author
Electronic Supplementary Material
Rights and permissions
About this article
Cite this article
Wang, N., Zheng, W., Wang, Z. et al. Collecting and analyzing key-value data under shuffled differential privacy. Front. Comput. Sci. 17, 172606 (2023). https://doi.org/10.1007/s11704-022-1572-0
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11704-022-1572-0