The Differential Privacy Frontier (Extended Abstract)

  • Cynthia Dwork
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5444)


We review the definition of differential privacy and briefly survey a handful of very recent contributions to the differential privacy frontier.


  1. 1.
    Barak, B., Chaudhuri, K., Dwork, C., Kale, S., McSherry, F., Talwar, K.: Privacy, accuracy, and consistency too: A holistic solution to contingency table release. In: Proceedings of the 26th Symposium on Principles of Database Systems, pp. 273–282 (2007)Google Scholar
  2. 2.
    Blum, A., Dwork, C., McSherry, F., Nissim, K.: Practical privacy: The SuLQ framework. In: Proceedings of the 24th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (June 2005)Google Scholar
  3. 3.
    Blum, A., Ligett, K., Roth, A.: A learning theory approach to non-interactive database privacy. In: Proceedings of the 40th ACM SIGACT Symposium on Thoery of Computing (2008)Google Scholar
  4. 4.
    Dinur, I., Nissim, K.: Revealing information while preserving privacy. In: Proceedings of the Twenty-Second ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, pp. 202–210 (2003)Google Scholar
  5. 5.
    Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  6. 6.
    Dwork, C., Lei, J.: Differential privacy and robust statistics (manuscript)(November 2008)Google Scholar
  7. 7.
    Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Proceedings of the 3rd Theory of Cryptography Conference, pp. 265–284 (2006)Google Scholar
  8. 8.
    Dwork, C., McSherry, F., Talwar, K.: The price of privacy and the limits of lp decoding. In: Proceedings of the 39th ACM Symposium on Theory of Computing, pp. 85–94 (2007)Google Scholar
  9. 9.
    Dwork, C., Naor, M.: On the difficulties of disclosure prevention in statistical databases or the case for differential privacy (manuscript, 2008)Google Scholar
  10. 10.
    Dwork, C., Naor, M., Reingold, O., Rothblum, G., Vadhan, S.: When and how can privacy-preserving data release be done efficiently? (November 2008) (manuscript)Google Scholar
  11. 11.
    Dwork, C., Nissim, K.: Privacy-preserving datamining on vertically partitioned databases. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 528–544. Springer, Heidelberg (2004)Google Scholar
  12. 12.
    Dwork, C., Yekhanin, S.: New efficient attacks on statistical disclosure control mechanisms. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 468–480. Springer, Heidelberg (2008)Google Scholar
  13. 13.
    Feldman, D., Fiat, A., Kaplan, H., Nissim, K.: Private coresets (November 2008) (manuscript)Google Scholar
  14. 14.
    Ghosh, A., Roughgarden, T., Sundarajan, M.: Universally utility-maximizing privacy mechanisms (November 2008) (manuscript)Google Scholar
  15. 15.
    Gupta, A., Ligett, K., McSherry, F., Roth, A., Talwar, K.: Differentially private approximation algorithms (November 2008) (manuscript)Google Scholar
  16. 16.
    Hampel, F., Ronchetti, E., Rousseeuw, P., Stahel, W.: Robust Statistics: The Approach Based on Influence Functions. John Wiley, New York (1986)MATHGoogle Scholar
  17. 17.
    Heitzig, J.: The ”jackknife” method: Confidentiality protection for complex statistical analyses. In: Proceedings of the Joint UNECE/Eurostat work session on statistical data confidentiality (2005)Google Scholar
  18. 18.
    Huber, P.: Robust statistics. John Wiley & Sons, Chichester (1981)MATHCrossRefGoogle Scholar
  19. 19.
    Kasiviswanathan, S., Lee, H., Nissim, K., Raskhodnikova, S., Smith, A.: What can we learn privately? In: Proceedings of FOCS 2008 (2008)Google Scholar
  20. 20.
    McSherry, F., Talwar, K.: Mechanism design via differential privacy. In: Proceedings of the 48th Annual Symposium on Foundations of Computer Science (2007)Google Scholar
  21. 21.
    Mironov, I., Pandey, O., Reingold, O., Vadhan, S.: Computational differential privacy (November 2008) (manuscript)Google Scholar
  22. 22.
    Quenouille, M.: Notes on bias in estimation. Biometrika 43, 353–360 (1956)MATHMathSciNetGoogle Scholar
  23. 23.
    Reingold, O., Trevisan, L., Tulsiani, M., Vadhan, S.: Dense subsets of pseudorandom sets. In: Proceedings 49th Annual IEEE Symposium on Foundations of Computing (2008)Google Scholar
  24. 24.
    Rubin, D.: Discussion: Statistical disclosure limitation. Journal of Official Statistics 9, 462–468 (1993)Google Scholar
  25. 25.
    Tukey, J.: Bias and confidence in not-quite large samples (abstract). Ann. Math. Statist., 29 (1958)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Cynthia Dwork
    • 1
  1. 1.Microsoft Research 

Personalised recommendations