Papers
Topics
Authors
Recent
Detailed Answer
Quick Answer
Concise responses based on abstracts only
Detailed Answer
Well-researched responses based on abstracts and relevant paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses
Gemini 2.5 Flash
Gemini 2.5 Flash 65 tok/s
Gemini 2.5 Pro 47 tok/s Pro
GPT-5 Medium 39 tok/s Pro
GPT-5 High 32 tok/s Pro
GPT-4o 97 tok/s Pro
Kimi K2 164 tok/s Pro
GPT OSS 120B 466 tok/s Pro
Claude Sonnet 4 38 tok/s Pro
2000 character limit reached

Achieving Dalenius' Goal of Data Privacy with Practical Assumptions (1703.07474v5)

Published 22 Mar 2017 in cs.CR, cs.IT, and math.IT

Abstract: Recent studies show that differential privacy is vulnerable when different individuals' data in the dataset are correlated, and that there are many cases where differential privacy implies poor utility. In order to treat the two weaknesses, we traced the origin of differential privacy to Dalenius' goal, a more rigorous privacy measure. We formalized Dalenius' goal by using Shannon's perfect secrecy and tried to achieve Dalenius' goal with better utility. Our first result is that, if the independence assumption is true, then differential privacy is equivalent to Dalenius' goal, where the independence assumption assumes that each adversary has no knowledge of the correlation among different individuals' data in the dataset. This implies that the security of differential privacy is based on the independence assumption. Since the independence assumption is impractical, we introduced a new practical assumption, which assumes that each adversary is unknown to some data of the dataset if the dataset is large enough. Based on the assumption, we can achieve Dalenius' goal with better utility. Furthermore, we proved a useful result which can transplant results or approaches of information theory into data privacy protection. We then proved that several basic privacy mechanisms/channels satisfy Dalenuis' goal, such as the random response, the exponential, and the Gaussian privacy channels, which are respective counterparts of the random response, the exponential, and the Gaussian mechanisms of differential privacy. Moreover, the group and the composition properties were also proved. Finally, by using Yao's computational information theory, we extend our model to the computational-bounded case.

Citations (4)
List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

Summary

We haven't generated a summary for this paper yet.

Dice Question Streamline Icon: https://streamlinehq.com

Follow-Up Questions

We haven't generated follow-up questions for this paper yet.