Lecture 5 : SV - robust Mechanisms and Bias - Control - Limited Source
نویسنده
چکیده
We have seen that additive noise technique is not (SV (γ), ε)-DP. So, the question that we explore in todays class is whether differential privacy (DP) is achievable with SV sources. Interestingly, we give a differential private mechanism for approximate arbitrary “low sensitive” functions that works even with randomness coming from SV source, for any γ < 1. We conclude todays lecture with some key insights to a new imperfect random source, we call BCL source.
منابع مشابه
Achieving Differential Privacy with Bias-Control Limited Source
In the design of differentially private mechanisms, it’s usually assumed that uniformly random source is available. However, in many situations it seems unrealistic, and one must deal with various imperfect random sources. Dodis et al. (CRYPTO’12) presented that differential privacy can be achieved with Santha-Vazirani (SV) source via adding a stronger property called SV-consistent sampling and...
متن کاملLecture 15: Simulating Bpp -high Min-entropy Sources 1 Simulating Bpp Using Sv-sources
It’s easy to check that any specific string of length n has probability at most (1 − δ), hence SV-sources are n log 1 1−δ -sources. Also recall that SV-sources are (k, l) block sources where k = l log 1 1−δ . Suppose δ = log 1 1−δ , then k = δl. Take a hash-based extractor E : {0, 1} × {0, 1} → {0, 1}. Here, our weak-source is a SVsource over the strings of length n and suppose k = n log 1 1−δ ...
متن کاملA Robust Discrete FuzzyP+FuzzyI+FuzzyD Load Frequency Controller for Multi-Source Power System in Restructuring Environment
In this paper a fuzzy logic (FL) based load frequency controller (LFC) called discrete FuzzyP+FuzzyI+FuzzyD (FP+FI+FD) is proposed to ensure the stability of a multi-source power system in restructured environment. The whale optimization algorithm (WOA) is used for optimum designing the proposed control strategy to reduce fuzzy system effort and achieve the best performance of LFC task. Further...
متن کاملDifferential Privacy with Imperfect Randomness
In this work we revisit the question of basing cryptography on imperfect randomness. Bosley and Dodis (TCC’07) showed that if a source of randomness R is “good enough” to generate a secret key capable of encrypting k bits, then one can deterministically extract nearly k almost uniform bits from R, suggesting that traditional privacy notions (namely, indistinguishability of encryption) requires ...
متن کاملA Low-bias Simulation Scheme for the Sabr Stochastic Volatility Model
The Stochastic Alpha Beta Rho Stochastic Volatility (SABR-SV) model is widely used in the financial industry for the pricing of fixed income instruments. In this paper we develop a low-bias simulation scheme for the SABR-SV model, which deals efficiently with (undesired) possible negative values in the asset price process, the martingale property of the discrete scheme and the discretization bi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013