Adaptive data analysis in a balanced adversarial model

K Nissim, U Stemmer, E Tsfadia - Advances in Neural …, 2023 - proceedings.neurips.cc
In adaptive data analysis, a mechanism gets $ n $ iid samples from an unknown distribution
$\cal {D} $, andis required to provide accurate estimations to a sequence of adaptively …

SoK: Computational and Distributed Differential Privacy for MPC

F Meisingseth, C Rechberger - Cryptology ePrint Archive, 2024 - eprint.iacr.org
In the last fifteen years, there has been a steady stream of works combining differential
privacy with various other cryptographic disciplines, particularly that of multi-party …

Practical Two-party Computational Differential Privacy with Active Security

F Meisingseth, C Rechberger… - Proceedings on Privacy …, 2025 - petsymposium.org
In this work we revisit the problem of using general-purpose MPC schemes to emulate the
trusted dataholder in differential privacy (DP), to achieve the same accuracy but without the …

Towards Separating Computational and Statistical Differential Privacy

B Ghazi, R Ilango, P Kamath, R Kumar… - 2023 IEEE 64th …, 2023 - ieeexplore.ieee.org
Computational differential privacy (CDP) is a natural relaxation of the standard notion of
(statistical) differential privacy (SDP) proposed by Beimel, Nissim, and Omri (CRYPTO 2008) …

Necessary conditions in multi-server differential privacy

A Cheu, C Yan - arXiv preprint arXiv:2208.08540, 2022 - arxiv.org
We consider protocols where users communicate with multiple servers to perform a
computation on the users' data. An adversary exerts semi-honest control over many of the …

Data Reconstruction: When You See It and When You Don't

E Cohen, H Kaplan, Y Mansour, S Moran… - arXiv preprint arXiv …, 2024 - arxiv.org
We revisit the fundamental question of formally defining what constitutes a reconstruction
attack. While often clear from the context, our exploration reveals that a precise definition is …

On the (Im) possibility of Time-Lock Puzzles in the Quantum Random Oracle Model

A Afshar, KM Chung, YC Hsieh, YT Lin… - … Conference on the …, 2023 - Springer
Time-lock puzzles wrap a solution s inside a puzzle P in such a way that “solving” P to find s
requires significantly more time than generating the pair (s, P), even if the adversary has …

Profile Reconstruction from Private Sketches

H Wu, R Pagh - arXiv preprint arXiv:2406.01158, 2024 - arxiv.org
Given a multiset of $ n $ items from $\mathcal {D} $, the\emph {profile reconstruction}
problem is to estimate, for $ t= 0, 1,\dots, n $, the fraction $\vec {f}[t] $ of items in $\mathcal …

Profile Reconstruction from Private Sketches

WU Hao, R Pagh - Forty-first International Conference on Machine … - openreview.net
Given a multiset of $ n $ items from $\mathcal {D} $, the\emph {profile reconstruction}
problem is to estimate, for $ t= 0, 1,\dots, n $, the fraction $\vec {f}[t] $ of items in $\mathcal …

Separating Key Agreement and Computational Differential Privacy

V Arora, E Chung, Z Li, T Tan - arXiv preprint arXiv:2304.07239, 2023 - arxiv.org
Two party differential privacy allows two parties who do not trust each other, to come
together and perform a joint analysis on their data whilst maintaining individual-level …