Private Linear Transformation: The Individual Privacy Case

被引:1
|
作者
Esmati, Nahid [1 ]
Heidarzadeh, Anoosheh [1 ]
Sprintson, Alex [1 ]
机构
[1] Texas A&M Univ, Dept Elect & Comp Engn, College Stn, TX 77843 USA
关键词
INFORMATION; CAPACITY;
D O I
10.1109/ISIT45174.2021.9517762
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper considers the single-server Private Linear Transformation (PLT) problem when individual privacy is required. In this problem, there is a user that wishes to obtain L linear combinations of a D-subset of messages belonging to a dataset of K messages stored on a single server. The goal is to minimize the download cost while keeping the identity of every message required for the computation individually private. We focus on the setting in which the matrix of coefficients pertaining to the required linear combinations is the generator matrix of a maximum distance separable code. We establish lower and upper bounds on the capacity of PLT with individual privacy, where the capacity is defined as the supremum of all achievable download rates. We show that our bounds are tight under certain divisibility conditions. In addition, we present lower bounds on the capacity of the settings in which the user has a prior side information about a subset of messages.
引用
收藏
页码:2131 / 2136
页数:6
相关论文
共 50 条
  • [21] IS THERE A PRIVATE RIGHT TO PRIVACY IN MALAYSIA?
    Ren, Raphael
    Guan, Saw Tiong
    Balan, Sujata
    IIUM LAW JOURNAL, 2022, 30 (01): : 1 - 32
  • [22] Privacy and the public/private divide
    Ashford, Chris
    O'Brien, Mark
    INFORMATION & COMMUNICATIONS TECHNOLOGY LAW, 2008, 17 (01) : 1 - 2
  • [23] THE DECLINE OF PRIVACY IN PRIVATE LAW
    COLLINS, H
    JOURNAL OF LAW AND SOCIETY, 1987, 14 (01) : 91 - 103
  • [24] Privacy and the public/private dichotomy
    Dawes, Simon
    THESIS ELEVEN, 2011, 107 (01) : 115 - 124
  • [25] DEFENDING THE PRIVATE IN CONSTITUTIONAL PRIVACY
    DECEW, JW
    JOURNAL OF VALUE INQUIRY, 1987, 21 (03): : 171 - 184
  • [26] Private Image Computation: the Case of Cloud based Privacy-preserving SIFT
    Qin, Zhan
    Yan, Jingbo
    Ren, Kui
    2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 179 - 180
  • [27] The Transformation of Identity and Privacy trough Online Social Networks (The CouchSurfing case)
    Miguel, Cristina
    Medina, Pilar
    MCLUHAN GALAXY CONFERENCE: UNDERSTANDING MEDIA, TODAY, 2011, : 307 - 318
  • [28] An efficient image privacy scheme based on nonlinear chaotic system and linear canonical transformation
    Arshad, Usman
    Khan, Majid
    Shaukat, Sajjad
    Amin, Muhammad
    Shah, Tariq
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2020, 546 (546)
  • [29] New Attacks against Transformation-Based Privacy-Preserving Linear Programming
    Laud, Peeter
    Pankova, Alisa
    SECURITY AND TRUST MANAGEMENT, STM 2013, 2013, 8203 : 17 - 32
  • [30] COMMUNITY, THE PRIVATE AND THE INDIVIDUAL
    FRASER, J
    SOCIOLOGICAL REVIEW, 1987, 35 (04): : 795 - 818