Private Linear Transformation: The Individual Privacy Case

被引:1
|
作者
Esmati, Nahid [1 ]
Heidarzadeh, Anoosheh [1 ]
Sprintson, Alex [1 ]
机构
[1] Texas A&M Univ, Dept Elect & Comp Engn, College Stn, TX 77843 USA
关键词
INFORMATION; CAPACITY;
D O I
10.1109/ISIT45174.2021.9517762
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper considers the single-server Private Linear Transformation (PLT) problem when individual privacy is required. In this problem, there is a user that wishes to obtain L linear combinations of a D-subset of messages belonging to a dataset of K messages stored on a single server. The goal is to minimize the download cost while keeping the identity of every message required for the computation individually private. We focus on the setting in which the matrix of coefficients pertaining to the required linear combinations is the generator matrix of a maximum distance separable code. We establish lower and upper bounds on the capacity of PLT with individual privacy, where the capacity is defined as the supremum of all achievable download rates. We show that our bounds are tight under certain divisibility conditions. In addition, we present lower bounds on the capacity of the settings in which the user has a prior side information about a subset of messages.
引用
收藏
页码:2131 / 2136
页数:6
相关论文
共 50 条
  • [31] EDUCATION, TECHNOLOGY, AND INDIVIDUAL PRIVACY
    GRAYSON, LP
    ECTJ-EDUCATIONAL COMMUNICATION AND TECHNOLOGY JOURNAL, 1978, 26 (03): : 195 - 206
  • [32] Inverse, composition, and identity: The case of function and linear transformation
    Bagley, Spencer
    Rasmussen, Chris
    Zandieh, Michelle
    JOURNAL OF MATHEMATICAL BEHAVIOR, 2015, 37 : 36 - 47
  • [33] Composing Differential Privacy and Secure Computation: A case study on scaling private record linkage
    He, Xi
    Machanavajjhala, Ashwin
    Flynn, Cheryl
    Srivastava, Divesh
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1389 - 1406
  • [34] On the privacy of private browsing - A forensic approach
    Satvat, Kiavash
    Forshaw, Matthew
    Hao, Feng
    Toreini, Ehsan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 88 - 100
  • [35] Enforcing privacy by withholding private information
    Lategan, F
    Olivier, MS
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 421 - 430
  • [36] Private Life and Privacy in Nazi Germany
    Latzel, Klaus
    HISTORISCHE ZEITSCHRIFT, 2021, 312 (03) : 847 - 848
  • [37] Privacy in Non-private Environments
    Blaeser, Markus
    Jakoby, Andreas
    Liskiewicz, Maciej
    Manthey, Bodo
    THEORY OF COMPUTING SYSTEMS, 2011, 48 (01) : 211 - 245
  • [38] Privacy in Feedback: The Differentially Private LQG
    Hale, Matthew
    Jones, Austin
    Leahy, Kevin
    2018 ANNUAL AMERICAN CONTROL CONFERENCE (ACC), 2018, : 3386 - 3391
  • [39] The private I: Privacy in a public world
    Marx, B
    AMERICAN BOOK REVIEW, 2001, 23 (01) : 14 - 14
  • [40] On the Privacy of Private Browsing - A Forensic Approach
    Satvat, Kiavash
    Forshaw, Matthew
    Hao, Feng
    Toreini, Ehsan
    DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, DPM 2013, 2014, 8247 : 380 - 389