Strong Hardness of Privacy from Weak Traitor Tracing.
Lucas KowalczykTal MalkinJonathan R. UllmanMark ZhandryPublished in: CoRR (2016)
Keyphrases
- privacy preserving
- privacy preserving data mining
- personal information
- private data
- personal data
- phase transition
- security concerns
- security issues
- privacy concerns
- security risks
- np hardness
- identity management
- data publishing
- privacy enhancing
- preserving privacy
- security and privacy issues
- data lineage
- data sets
- differential privacy
- privacy preservation
- privacy protection
- private information
- statistical databases
- learning theory
- worst case
- computational complexity
- high level