{"id":"https://openalex.org/W2967383583","doi":"https://doi.org/10.5220/0007919404250430","title":"Differential Privacy meets Verifiable Computation: Achieving Strong Privacy and Integrity Guarantees","display_name":"Differential Privacy meets Verifiable Computation: Achieving Strong Privacy and Integrity Guarantees","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2967383583","doi":"https://doi.org/10.5220/0007919404250430","mag":"2967383583"},"language":"en","primary_location":{"id":"doi:10.5220/0007919404250430","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007919404250430","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th International Joint Conference on e-Business and Telecommunications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0007919404250430","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023374324","display_name":"Georgia Tsaloli","orcid":"https://orcid.org/0000-0002-1552-6852"},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Georgia Tsaloli","raw_affiliation_strings":["Department of Computer Science and Engineering, Chalmers University of Technology, Gothenburg and Sweden, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Chalmers University of Technology, Gothenburg and Sweden, --- Select a Country ---","institution_ids":["https://openalex.org/I66862912"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035190728","display_name":"Aikaterini Mitrokotsa","orcid":"https://orcid.org/0000-0002-7073-0258"},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Aikaterini Mitrokotsa","raw_affiliation_strings":["Department of Computer Science and Engineering, Chalmers University of Technology, Gothenburg and Sweden, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Chalmers University of Technology, Gothenburg and Sweden, --- Select a Country ---","institution_ids":["https://openalex.org/I66862912"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5023374324"],"corresponding_institution_ids":["https://openalex.org/I66862912"],"apc_list":null,"apc_paid":null,"fwci":0.1443,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.57789341,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"425","last_page":"430"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9781000018119812,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.8700697422027588},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.842616081237793},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7508273124694824},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.6023859977722168},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.5720792412757874},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5181154608726501},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5085676908493042},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.499495267868042},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.4876512289047241},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.31133198738098145},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.14770865440368652},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.06806930899620056}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.8700697422027588},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.842616081237793},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7508273124694824},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.6023859977722168},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.5720792412757874},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5181154608726501},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5085676908493042},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.499495267868042},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.4876512289047241},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.31133198738098145},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.14770865440368652},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.06806930899620056},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.5220/0007919404250430","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007919404250430","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th International Joint Conference on e-Business and Telecommunications","raw_type":"proceedings-article"},{"id":"pmh:oai:www.alexandria.unisg.ch:262273","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400650","display_name":"Alexandria (UniSG) (University of St.Gallen)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210158813","host_organization_name":"St.Gallen University of Teacher Education","host_organization_lineage":["https://openalex.org/I4210158813"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"},{"id":"pmh:oai:research.chalmers.se:512135","is_oa":false,"landing_page_url":"https://research.chalmers.se/en/publication/512135","pdf_url":null,"source":{"id":"https://openalex.org/S4306402469","display_name":"Chalmers Research (Chalmers University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I66862912","host_organization_name":"Chalmers University of Technology","host_organization_lineage":["https://openalex.org/I66862912"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:research.chalmers.se:512972","is_oa":false,"landing_page_url":"https://research.chalmers.se/en/publication/9032851f-d72c-4b6f-8a2b-4cf869ba569b","pdf_url":null,"source":{"id":"https://openalex.org/S4306402469","display_name":"Chalmers Research (Chalmers University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I66862912","host_organization_name":"Chalmers University of Technology","host_organization_lineage":["https://openalex.org/I66862912"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"doi:10.5220/0007919404250430","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007919404250430","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th International Joint Conference on e-Business and Telecommunications","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.44999998807907104,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1557783852","https://openalex.org/W3022237949","https://openalex.org/W3088939963","https://openalex.org/W2357761884","https://openalex.org/W1474916271","https://openalex.org/W3205687329","https://openalex.org/W2810763716","https://openalex.org/W2363470634","https://openalex.org/W3029810255","https://openalex.org/W2111019861"],"abstract_inverted_index":{"Often":[0],"service":[1,23],"providers":[2,24],"need":[3],"to":[4,49,67,160],"outsource":[5],"computations":[6],"on":[7],"sensitive":[8,39],"datasets":[9],"and":[10,102,136,153,174,178],"subsequently":[11],"publish":[12],"statistical":[13],"results":[14],"over":[15],"a":[16,57,87,129,165],"population":[17],"of":[18,30,53,69,76,94,98,147],"users.":[19],"In":[20,117],"this":[21,109,118],"setting,":[22],"want":[25,35],"guarantees":[26,36,139,173],"about":[27,59,79,86],"the":[28,31,74,92,96,122,145,156],"correctness":[29,97],"computations,":[32],"while":[33,82],"individuals":[34,60],"that":[37,131,167],"their":[38,111],"information":[40,85],"will":[41],"remain":[42],"private.":[43],"Encryption":[44],"mechanisms":[45],"are":[46,105,155],"not":[47],"sufficient":[48],"avoid":[50],"any":[51],"leakage":[52,68],"information,":[54],"since":[55],"querying":[56],"database":[58],"or":[61],"requesting":[62],"summary":[63],"statistics":[64],"can":[65,126],"lead":[66],"information.":[70],"Differential":[71],"privacy":[72,104,135,179],"addresses":[73,91],"paradox":[75],"learning":[77,83],"nothing":[78],"an":[80],"individual,":[81],"useful":[84],"population.":[88],"Verifiable":[89],"computation":[90,101,138,151,172],"challenge":[93],"proving":[95],"computations.Although":[99],"verifiable":[100,137,148,169],"differential":[103,134],"important":[106],"tools":[107],"in":[108],"context,":[110],"interconnection":[112],"has":[113],"received":[114],"limited":[115],"attention.":[116],"paper,":[119],"we":[120,127,163],"address":[121],"following":[123],"question:":[124],"How":[125],"design":[128],"protocol":[130,166],"provides":[132,168],"both":[133],"for":[140],"outsourced":[141],"computations?We":[142],"formally":[143],"define":[144],"notion":[146],"differentially":[149,170],"private":[150,171],"(VDPC)":[152],"what":[154],"minimal":[157],"requirements":[158],"needed":[159],"achieve":[161],"VDPC.Furthermore,":[162],"propose":[164],"discuss":[175],"its":[176],"security":[177],"properties.":[180]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
