Composing differential privacy and secure computation: A case study on scaling private record linkage

X He, A Machanavajjhala, C Flynn… - Proceedings of the 2017 …, 2017 - dl.acm.org
Private record linkage (PRL) is the problem of identifying pairs of records that are similar as
per an input matching rule from databases held by two parties that do not trust one another …

[PDF][PDF] An efficient two-party protocol for approximate matching in private record linkage

D Vatsalan, P Christen, V Verykios - 2011 - cs.anu.edu.au
The task of linking multiple databases with the aim to identify records that refer to the same
entity is occurring increasingly in many application areas. If unique identifiers for the entities …

Private record matching using differential privacy

A Inan, M Kantarcioglu, G Ghinita… - Proceedings of the 13th …, 2010 - dl.acm.org
Private matching between datasets owned by distinct parties is a challenging problem with
several applications. Private matching allows two parties to identify the records that are …

Differentially private data aggregation with optimal utility

F Eigner, A Kate, M Maffei, F Pampaloni… - Proceedings of the 30th …, 2014 - dl.acm.org
Computing aggregate statistics about user data is of vital importance for a variety of services
and systems, but this practice has been shown to seriously undermine the privacy of users …

One-sided differential privacy

I Kotsogiannis, S Doudalis, S Haney… - 2020 IEEE 36th …, 2020 - ieeexplore.ieee.org
We study the problem of privacy-preserving data sharing, wherein only a subset of the
records in a database is sensitive, possibly based on predefined privacy policies. Existing …

Efficient privacy-aware record integration

M Kuzu, M Kantarcioglu, A Inan, E Bertino… - Proceedings of the 16th …, 2013 - dl.acm.org
The integration of information dispersed among multiple repositories is a crucial step for
accurate data analysis in various domains. In support of this goal, it is critical to devise …

Cryptϵ: Crypto-assisted differential privacy on untrusted servers

A Roy Chowdhury, C Wang, X He… - Proceedings of the …, 2020 - dl.acm.org
Differential privacy (DP) is currently the de-facto standard for achieving privacy in data
analysis, which is typically implemented either in the" central" or" local" model. The local …

Asymmetric private set intersection with applications to contact tracing and private vertical federated machine learning

N Angelou, A Benaissa, B Cebere, W Clark… - arXiv preprint arXiv …, 2020 - arxiv.org
We present a multi-language, cross-platform, open-source library for asymmetric private set
intersection (PSI) and PSI-Cardinality (PSI-C). Our protocol combines traditional DDH-based …

Honeycrisp: large-scale differentially private aggregation without a trusted core

E Roth, D Noble, BH Falk, A Haeberlen - Proceedings of the 27th ACM …, 2019 - dl.acm.org
Recently, a number of systems have been deployed that gather sensitive statistics from user
devices while giving differential privacy guarantees. One prominent example is the …

Differentially private sql with bounded user contribution

RJ Wilson, CY Zhang, W Lam, D Desfontaines… - arXiv preprint arXiv …, 2019 - arxiv.org
Differential privacy (DP) provides formal guarantees that the output of a database query
does not reveal too much information about any individual present in the database. While …