Private Linear Transformation: The Individual Privacy Case

被引:1
|
作者
Esmati, Nahid [1 ]
Heidarzadeh, Anoosheh [1 ]
Sprintson, Alex [1 ]
机构
[1] Texas A&M Univ, Dept Elect & Comp Engn, College Stn, TX 77843 USA
关键词
INFORMATION; CAPACITY;
D O I
10.1109/ISIT45174.2021.9517762
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper considers the single-server Private Linear Transformation (PLT) problem when individual privacy is required. In this problem, there is a user that wishes to obtain L linear combinations of a D-subset of messages belonging to a dataset of K messages stored on a single server. The goal is to minimize the download cost while keeping the identity of every message required for the computation individually private. We focus on the setting in which the matrix of coefficients pertaining to the required linear combinations is the generator matrix of a maximum distance separable code. We establish lower and upper bounds on the capacity of PLT with individual privacy, where the capacity is defined as the supremum of all achievable download rates. We show that our bounds are tight under certain divisibility conditions. In addition, we present lower bounds on the capacity of the settings in which the user has a prior side information about a subset of messages.
引用
收藏
页码:2131 / 2136
页数:6
相关论文
共 50 条
  • [1] Private Linear Transformation: The Joint Privacy Case
    Esmati, Nahid
    Heidarzadeh, Anoosheh
    Sprintson, Alex
    2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 2125 - 2130
  • [2] Single-Server Private Linear Transformation: The Joint Privacy Case
    Heidarzadeh, Anoosheh
    Esmati, Nahid
    Sprintson, Alex
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2022, 40 (03) : 899 - 911
  • [3] Private Computation with Individual and Joint Privacy
    Heidarzadeh, Anoosheh
    Sprintson, Alex
    2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2020, : 1112 - 1117
  • [4] Infringement of Individual Privacy via Mining Differentially Private GWAS Statistics
    Wang, Yue
    Wen, Jia
    Wu, Xintao
    Shi, Xinghua
    BIG DATA COMPUTING AND COMMUNICATIONS, (BIGCOM 2016), 2016, 9784 : 355 - 366
  • [5] REVISIT LINEAR TRANSFORMATION FOR IMAGE PRIVACY IN MACHINE LEARNING
    Xu, Zhiwei
    Lu, Yangdi
    He, Wenbo
    2023 5TH IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS, TPS-ISA, 2023, : 156 - 162
  • [6] Improving the Privacy and Practicality of Objective Perturbation for Differentially Private Linear Learners
    Redberg, Rachel
    Koskela, Antti
    Wang, Yu-Xiang
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 36 (NEURIPS 2023), 2023,
  • [7] The individual, racism and transformation: a psychoanalytic case
    Kometsi, Kgamadi
    SOCIAL DYNAMICS-A JOURNAL OF THE CENTRE FOR AFRICAN STUDIES UNIVERSITY OF CAPE TOWN, 2008, 34 (02): : 119 - 127
  • [8] PRIVACY OF INDIVIDUAL
    DOYLE, V
    WORLD MEDICAL JOURNAL, 1974, 21 (02) : 32 - 33
  • [9] IoT-Privacy: To Be Private or Not To Be Private
    Ukil, Arijit
    Bandyopadhyay, Soma
    Pal, Arpan
    2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 123 - 124
  • [10] PRIVACY OF INDIVIDUAL
    HATTONSM.JA
    COMPUTER BULLETIN, 1971, 15 (09): : 316 - &