1 code implementation • 5 Jun 2017 • Georgios Kellaris, George Kollios, Kobbi Nissim, Adam O'Neill
In this work we present a model for differentially private outsourced database system and a concrete construction, $\mathcal{E}\text{psolute}$, that provably conceals the aforementioned leakages, while remaining efficient and scalable.
Cryptography and Security