Two-Source Non-Malleable Extractors and Applications to Privacy Amplification with Tamperable Memory.
Divesh AggarwalMaciej ObremskiJoão L. RibeiroMark SimkinLuisa SiniscalchiPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- privacy preserving
- personal information
- security issues
- main memory
- computing power
- privacy enhancing
- statistical databases
- preserving privacy
- privacy preserving data mining
- low memory
- memory requirements
- private data
- data sets
- memory usage
- security concerns
- privacy policies
- differential privacy
- individual privacy
- location privacy
- security risks
- privacy preservation
- personal data
- real time
- neural network
- private information
- access control