Privately Querying Privacy: Privacy Estimation with Guaranteed Privacy of User and Database Party

[1]  Ashwin Machanavajjhala,et al.  PrivateSQL , 2019, Proceedings of the VLDB Endowment.

[2]  Geoffroy Couteau,et al.  New Protocols for Secure Equality Test and Comparison , 2018, ACNS.

[3]  Benny Pinkas,et al.  Private Set Intersection for Unequal Set Sizes with Mobile Applications , 2017, Proc. Priv. Enhancing Technol..

[4]  Vladimir Kolesnikov,et al.  Efficient Batched Oblivious PRF with Applications to Private Set Intersection , 2016, CCS.

[5]  Gang Xu,et al.  Secure multiparty computation of a comparison problem , 2016, SpringerPlus.

[6]  Marc-Olivier Killijian,et al.  XPIR : Private Information Retrieval for Everyone , 2016, Proc. Priv. Enhancing Technol..

[7]  David Eckhoff,et al.  Metrics : a Systematic Survey , 2018 .

[8]  Michael Zohner,et al.  ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation , 2015, NDSS.

[9]  Oliver Diggelmann,et al.  How the Right to Privacy Became a Human Right , 2014 .

[10]  Eran Halperin,et al.  Identifying Personal Genomes by Surname Inference , 2013, Science.

[11]  Ahmad-Reza Sadeghi,et al.  Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima , 2009, IACR Cryptol. ePrint Arch..

[12]  Moti Yung,et al.  Efficient robust private set intersection , 2009, Int. J. Appl. Cryptogr..

[13]  Cynthia Dwork,et al.  Differential Privacy: A Survey of Results , 2008, TAMC.

[14]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[15]  Benny Pinkas,et al.  Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.

[16]  Moni Naor,et al.  Oblivious transfer and polynomial evaluation , 1999, STOC '99.

[17]  Eyal Kushilevitz,et al.  Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.

[18]  Oded Goldreich,et al.  A randomized protocol for signing contracts , 1985, CACM.

[19]  Carroll Morgan,et al.  Differential privacy , 2020, The Science of Quantitative Information Flow.