The Differential Privacy Frontier (Extended Abstract)

We review the definition of differential privacy and briefly survey a handful of very recent contributions to the differential privacy frontier.

[1]  M. H. Quenouille NOTES ON BIAS IN ESTIMATION , 1956 .

[2]  J. Tukey A Smooth Invertibility Theorem , 1958 .

[3]  Robin Milner,et al.  On Observing Nondeterminism and Concurrency , 1980, ICALP.

[4]  Peter J. Huber,et al.  Robust Statistics , 2005, Wiley Series in Probability and Statistics.

[5]  Werner A. Stahel,et al.  Robust Statistics: The Approach Based on Influence Functions , 1987 .

[6]  Irit Dinur,et al.  Revealing information while preserving privacy , 2003, PODS.

[7]  Cynthia Dwork,et al.  Privacy-Preserving Datamining on Vertically Partitioned Databases , 2004, CRYPTO.

[8]  Matthew Franklin,et al.  Advances in Cryptology – CRYPTO 2004 , 2004, Lecture Notes in Computer Science.

[9]  B. Ripley,et al.  Robust Statistics , 2018, Encyclopedia of Mathematical Geosciences.

[10]  J. Heitzig THE “JACKKNIFE” METHOD: CONFIDENTIALITY PROTECTION FOR COMPLEX STATISTICAL ANALYSES , 2005 .

[11]  Cynthia Dwork,et al.  Practical privacy: the SuLQ framework , 2005, PODS.

[12]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[13]  Cynthia Dwork,et al.  Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.

[14]  Cynthia Dwork,et al.  The price of privacy and the limits of LP decoding , 2007, STOC '07.

[15]  Daniel A. Spielman,et al.  Spectral Graph Theory and its Applications , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).

[16]  Cynthia Dwork,et al.  Privacy, accuracy, and consistency too: a holistic solution to contingency table release , 2007, PODS.

[17]  Kunal Talwar,et al.  Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).

[18]  Madhur Tulsiani,et al.  Dense Subsets of Pseudorandom Sets , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.

[19]  A. Blum,et al.  A learning theory approach to non-interactive database privacy , 2008, STOC.

[20]  Sofya Raskhodnikova,et al.  What Can We Learn Privately? , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.

[21]  Martijn Stam Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions , 2008, CRYPTO.

[22]  Cynthia Dwork,et al.  New Efficient Attacks on Statistical Disclosure Control Mechanisms , 2008, CRYPTO.

[23]  Haim Kaplan,et al.  Private coresets , 2009, STOC '09.

[24]  Tim Roughgarden,et al.  Universally utility-maximizing privacy mechanisms , 2008, STOC '09.

[25]  Cynthia Dwork,et al.  Differential privacy and robust statistics , 2009, STOC '09.

[26]  Aaron Roth,et al.  Differentially Private Approximation Algorithms , 2009, ArXiv.

[27]  Omer Reingold,et al.  Computational Differential Privacy , 2009, CRYPTO.

[28]  Moni Naor,et al.  On the Difficulties of Disclosure Prevention in Statistical Databases or The Case for Differential Privacy , 2010, J. Priv. Confidentiality.