共 51 条
[1]
Adleman L., 1978, Found. Secure Comput, V4, P169, DOI DOI 10.4067/S0716-078X2003000400011
[3]
Secure Multi-party Computation of Differentially Private Heavy Hitters
[J].
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2021,
:2361-2377
[4]
Böhler J, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P2147
[5]
Canetti R., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P639, DOI 10.1145/237814.238015
[6]
Duchi J. C., 2013, Comput. Sci.
[8]
Dwork C., 2016, J PRIVACY CONFIDENTI, V7, P17, DOI DOI 10.29012/JPC.V7I3.405
[9]
Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
[10]
The Power of Factorization Mechanisms in Local and Central Differential Privacy
[J].
PROCEEDINGS OF THE 52ND ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING (STOC '20),
2020,
:425-438