Differential privacy: Review of improving utility through cryptography-based technologies
- Publisher:
- WILEY
- Publication Type:
- Journal Article
- Citation:
- Concurrency and Computation: Practice and Experience, 2023, 35, (5)
- Issue Date:
- 2023-02-28
Closed Access
Filename | Description | Size | |||
---|---|---|---|---|---|
Concurrency and Computation - 2022 - Huang - Differential privacy Review of improving utility through cryptography‐based.pdf | Accepted version | 1.56 MB |
Copyright Clearance Process
- Recently Added
- In Progress
- Closed Access
This item is closed access and not available.
Due to successful applications of data analysis technologies in many fields, various institutions have accumulated a large amount of data to improve their services. As the speed of data collection has increased dramatically over the last few years, an increasing number of users are growing concerned about their personal information. Therefore, privacy preservation has become an urgent problem to be solved. Differential privacy as a strong privacy preservation tool has attracted significant attention. In this review, we focus on improving data utility of differentially private mechanisms through technologies related to cryptography. In particular, we first focus on how to improve data utility through anonymous communication. Then, we summarize how to improve data utility by combining differentially private mechanisms with homomorphic encryption schemes. Next, we summarize hardness results of what is impossible to achieve for differentially private mechanisms' data utility from the view of cryptography. Differential privacy borrowed intuitions from cryptography and still benefits from the progress of cryptography. To summarize the state-of-the-art and to benefit future researches, we are motivated to provide this review.
Please use this identifier to cite or link to this item: