Publication | Closed Access
On significance of the least significant bits for differential privacy
173
Citations
25
References
2012
Year
Unknown Venue
Privacy ProtectionEngineeringInformation SecurityInformation ForensicsComputational ComplexityLeast Significant BitsFormal VerificationPrivacy EngineeringPrivacy-preserving CommunicationPrivate ComputationsVulnerability PresentSecure Multi-party ComputationPrivacy By DesignData PrivacyComputer SciencePrivacy AnonymityDifferential PrivacyPrivacyData SecurityCryptographyProgram AnalysisFormal MethodsPrivate Mechanisms
We describe a new type of vulnerability present in many implementations of differentially private mechanisms. In particular, all four publicly available general purpose systems for differentially private computations are susceptible to our attack.
| Year | Citations | |
|---|---|---|
Page 1
Page 1