03192nam 2200457 450 991055938390332120231110224200.03-030-96398-5(MiAaPQ)EBC6950786(Au-PeEL)EBL6950786(CKB)21500800700041(PPN)262168995(EXLCZ)992150080070004120221117d2022 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierGuide to differential privacy modifications a taxonomy of variants and extensions /Balázs Pejó and Damien DesfontainesCham, Switzerland :Springer International Publishing,[2022]©20221 online resource (91 pages)SpringerBriefs in Computer Science Print version: Pejó, Balázs Guide to Differential Privacy Modifications Cham : Springer International Publishing AG,c2022 9783030963972 Intro -- Preface -- Contents -- 1 Introduction -- References -- 2 Differential Privacy -- 2.1 The Original Version -- 2.2 Dimensions -- 2.3 Properties -- 2.4 Relations Between Definitions -- References -- 3 Quantification of Privacy Loss (Q) -- 3.1 Allowing a Small Probability of Error -- 3.2 Averaging the Privacy Loss -- 3.3 Controlling the Tail Distribution -- 3.4 Extension -- 3.5 Multidimensional Definitions -- References -- 4 Neighborhood Definition (N) -- 4.1 Changing the Sensitive Property -- 4.2 Limiting the Scope of the Definition -- 4.3 Considering Other Types of Input -- 4.4 Extensions -- 4.5 Multidimensional Definitions -- References -- 5 Variation of Privacy Loss (V) -- 5.1 Allocating Different Privacy Levels -- 5.2 Randomizing the Privacy Levels -- 5.3 Multidimensional Definitions -- References -- 6 Background Knowledge (B) -- 6.1 Conditioning on the Sensitive Property -- 6.2 Removing the Effect of Correlations -- 6.3 Multidimensional Definitions -- References -- 7 Change in Formalism (F) -- 7.1 Hypothesis Testing Interpretation -- 7.2 Prior-Posterior Bounds -- 7.3 Comparing Two Posteriors -- 7.4 Multidimensional Definitions -- References -- 8 Knowledge Gain Relativization (R) -- 8.1 Auxiliary Leakage Functions -- 8.2 Zero-knowledge Proofs -- 8.3 Multidimensional Definitions -- References -- 9 Computational Power (C) -- 9.1 Multidimensional Definitions -- References -- 10 Summarizing Table -- 10.1 Proofs of Properties -- References -- 11 Scope and Related Work -- 11.1 Methodology -- 11.2 Out of Scope Definitions -- 11.3 Local Model and Other Contexts -- 11.4 Related Work -- References -- 12 Conclusion.SpringerBriefs in Computer Science Computer securitySoftwareComputer securityData processingComputer securityComputer securityData processing.005.8Pejó Balázs1221599Desfontaines DamienMiAaPQMiAaPQMiAaPQBOOK9910559383903321Guide to differential privacy modifications2968533UNINA