Lecture 5 : SV - robust Mechanisms and Bias - Control - Limited Source

نویسنده

  • Abhishek Samanta
چکیده

We have seen that additive noise technique is not (SV (γ), ε)-DP. So, the question that we explore in todays class is whether differential privacy (DP) is achievable with SV sources. Interestingly, we give a differential private mechanism for approximate arbitrary “low sensitive” functions that works even with randomness coming from SV source, for any γ < 1. We conclude todays lecture with some key insights to a new imperfect random source, we call BCL source.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Achieving Differential Privacy with Bias-Control Limited Source

In the design of differentially private mechanisms, it’s usually assumed that uniformly random source is available. However, in many situations it seems unrealistic, and one must deal with various imperfect random sources. Dodis et al. (CRYPTO’12) presented that differential privacy can be achieved with Santha-Vazirani (SV) source via adding a stronger property called SV-consistent sampling and...

متن کامل

Lecture 15: Simulating Bpp -high Min-entropy Sources 1 Simulating Bpp Using Sv-sources

It’s easy to check that any specific string of length n has probability at most (1 − δ), hence SV-sources are n log 1 1−δ -sources. Also recall that SV-sources are (k, l) block sources where k = l log 1 1−δ . Suppose δ = log 1 1−δ , then k = δl. Take a hash-based extractor E : {0, 1} × {0, 1} → {0, 1}. Here, our weak-source is a SVsource over the strings of length n and suppose k = n log 1 1−δ ...

متن کامل

A Robust Discrete FuzzyP+FuzzyI+FuzzyD Load Frequency Controller for Multi-Source Power System in Restructuring Environment

In this paper a fuzzy logic (FL) based load frequency controller (LFC) called discrete FuzzyP+FuzzyI+FuzzyD (FP+FI+FD) is proposed to ensure the stability of a multi-source power system in restructured environment. The whale optimization algorithm (WOA) is used for optimum designing the proposed control strategy to reduce fuzzy system effort and achieve the best performance of LFC task. Further...

متن کامل

Differential Privacy with Imperfect Randomness

In this work we revisit the question of basing cryptography on imperfect randomness. Bosley and Dodis (TCC’07) showed that if a source of randomness R is “good enough” to generate a secret key capable of encrypting k bits, then one can deterministically extract nearly k almost uniform bits from R, suggesting that traditional privacy notions (namely, indistinguishability of encryption) requires ...

متن کامل

A Low-bias Simulation Scheme for the Sabr Stochastic Volatility Model

The Stochastic Alpha Beta Rho Stochastic Volatility (SABR-SV) model is widely used in the financial industry for the pricing of fixed income instruments. In this paper we develop a low-bias simulation scheme for the SABR-SV model, which deals efficiently with (undesired) possible negative values in the asset price process, the martingale property of the discrete scheme and the discretization bi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013