Local, private, efficient protocols for succinct histograms

R Bassily, A Smith - Proceedings of the forty-seventh annual ACM …, 2015 - dl.acm.org
We give efficient protocols and matching accuracy lower bounds for frequency estimation in
the local model for differential privacy. In this model, individual users randomize their data …

Practical locally private heavy hitters

R Bassily, K Nissim, U Stemmer… - Advances in Neural …, 2017 - proceedings.neurips.cc
We present new practical local differentially private heavy hitters algorithms achieving
optimal or near-optimal worst-case error--TreeHist and Bitstogram. In both algorithms, server …

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

Y Dodis, L Reyzin, A Smith - … : International Conference On The Theory And …, 2004 - Springer
We provide formal definitions and efficient secure techniques for turning biometric
information into keys usable for any cryptographic application, and reliably and securely …

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

Y Dodis, R Ostrovsky, L Reyzin, A Smith - SIAM journal on computing, 2008 - SIAM
We provide formal definitions and efficient secure techniques for turning noisy information
into keys usable for any cryptographic application, and, in particular, reliably and securely …

Worst-case optimal join algorithms

HQ Ngo, E Porat, C Ré, A Rudra - Journal of the ACM (JACM), 2018 - dl.acm.org
Efficient join processing is one of the most fundamental and well-studied tasks in database
research. In this work, we examine algorithms for natural join queries over many relations …

[图书][B] Handbook of linear algebra

L Hogben - 2006 - books.google.com
The Handbook of Linear Algebra provides comprehensive coverage of linear algebra
concepts, applications, and computational software packages in an easy-to-use handbook …

Heavy hitters and the structure of local privacy

M Bun, J Nelson, U Stemmer - ACM Transactions on Algorithms (TALG), 2019 - dl.acm.org
We present a new locally differentially private algorithm for the heavy hitters problem that
achieves optimal worst-case error as a function of all standardly considered parameters …

Proofs of retrievability via hardness amplification

Y Dodis, S Vadhan, D Wichs - Theory of Cryptography: 6th Theory of …, 2009 - Springer
Abstract Proofs of Retrievability (PoR), introduced by Juels and Kaliski [JK07], allow the
client to store a file F on an untrusted server, and later run an efficient audit protocol in which …

[图书][B] Algorithms and theory of computation handbook, volume 2: special topics and techniques

MJ Atallah, M Blanton - 2009 - books.google.com
This handbook provides an up-to-date compendium of fundamental computer science
topics, techniques, and applications. Along with updating and revising many of the existing …

Leakage-resilient public-key cryptography in the bounded-retrieval model

J Alwen, Y Dodis, D Wichs - Advances in Cryptology-CRYPTO 2009: 29th …, 2009 - Springer
We study the design of cryptographic primitives resilient to key-leakage attacks, where an
attacker can repeatedly and adaptively learn information about the secret key, subject only …