{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:37:09Z","timestamp":1725889029162},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319600796"},{"type":"electronic","value":"9783319600802"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60080-2_5","type":"book-chapter","created":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T14:40:06Z","timestamp":1496328006000},"page":"68-85","source":"Crossref","is-referenced-by-count":0,"title":["On the Optimality of the Exponential Mechanism"],"prefix":"10.1007","author":[{"given":"Francesco","family":"Ald\u00e0","sequence":"first","affiliation":[]},{"given":"Hans Ulrich","family":"Simon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,2]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Ald\u00e0, F., Simon, H.U.: A lower bound on the release of differentially private integer partitions. Inf. Process. Lett. (2017, submitted)","DOI":"10.1016\/j.ipl.2017.09.001"},{"key":"5_CR2","unstructured":"Blocki, J.: Differentially private integer partitions and their applications (2016). tpdp.16.cse.buffalo.edu\/abstracts\/TPDP_2016_4.pdf . Accessed 08 Aug 2016"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Blocki, J., Datta, A., Bonneau, J.: Differentially private password frequency lists. In: Proceedings of the 23rd Annual Network and Distributed System Security Symposium (2016)","DOI":"10.14722\/ndss.2016.23328"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Blum, A., Ligett, K., Roth, A.: A learning theory approach to non-interactive database privacy. J. ACM 60(2), 12 (2013)","DOI":"10.1145\/2450142.2450148"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Brenner, H., Nissim, K.: Impossibility of differentially private universally optimal mechanisms. In: Proceedings of the 51st Annual IEEE Symposium on Foundations of Computer Science, pp. 71\u201380 (2010)","DOI":"10.1109\/FOCS.2010.13"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-642-28914-9_18","volume-title":"Theory of Cryptography","author":"A De","year":"2012","unstructured":"De, A.: Lower bounds in differential privacy. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 321\u2013338. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-28914-9_18"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Duchi, J.C., Jordan, M.I., Wainwright, M.J.: Local privacy and statistical minimax rates. In: Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, pp. 429\u2013438 (2013)","DOI":"10.1109\/FOCS.2013.53"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). doi: 10.1007\/11681878_14"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Dwork, C., McSherry, F., Talwar, K.: The price of privacy and the limits of LP decoding. In: Proceedings of the 39th Annual ACM Symposium on Theory of Computing, pp. 85\u201394 (2007)","DOI":"10.1145\/1250790.1250804"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Geng, Q., Kairouz, P., Oh, S., Viswanath, P.: The staircase mechanism in differential privacy. IEEE J. Sel. Top. Sign. Process. 9(7), 1176\u20131184 (2015)","DOI":"10.1109\/JSTSP.2015.2425831"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Ghosh, A., Roughgarden, T., Sundararajan, M.: Universally utility-maximizing privacy mechanisms. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, pp. 351\u2013360 (2009)","DOI":"10.1145\/1536414.1536464"},{"key":"5_CR12","unstructured":"Hall, R., Rinaldo, A., Wasserman, L.: Random differential privacy. J. Priv. Confidentiality 4(2), 43\u201359 (2012)"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Hardt, M., Talwar, K.: On the geometry of differential privacy. In: Proceedings of the 42nd ACM Symposium on Theory of Computing, pp. 705\u2013714 (2010)","DOI":"10.1145\/1806689.1806786"},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1007\/978-3-662-43948-7_51","volume-title":"Automata, Languages, and Programming","author":"J Hsu","year":"2014","unstructured":"Hsu, J., Roth, A., Roughgarden, T., Ullman, J.: Privately solving linear programs. In: Esparza, J., Fraigniaud, P., Husfeldt, T., Koutsoupias, E. (eds.) ICALP 2014. LNCS, vol. 8572, pp. 612\u2013624. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-43948-7_51"},{"key":"5_CR15","unstructured":"Kairouz, P., Oh, S., Viswanath, P.: Extremal mechanisms for local differential privacy. In: Advances in Neural Information Processing Systems, pp. 2879\u20132887 (2014)"},{"issue":"3","key":"5_CR16","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1137\/090756090","volume":"40","author":"SP Kasiviswanathan","year":"2011","unstructured":"Kasiviswanathan, S.P., Lee, H.K., Nissim, K., Raskhodnikova, S., Smith, A.: What can we learn privately. SIAM J. Comput. 40(3), 793\u2013826 (2011)","journal-title":"SIAM J. Comput."},{"key":"5_CR17","unstructured":"Koufogiannis, F., Han, S., Pappas, G.J.: Optimality of the Laplace mechanism in differential privacy. arXiv preprint arXiv:1504.00065 (2015)"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"McGregor, A., Mironov, I., Pitassi, T., Reingold, O., Talwar, K., Vadhan, S.: The limits of two-party differential privacy. In: Proceedings of the 51st Annual IEEE Symposium on Foundations of Computer Science, pp. 81\u201390 (2010)","DOI":"10.1109\/FOCS.2010.14"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"McSherry, F., Talwar, K.: Mechanism design via differential privacy. In: Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, pp. 94\u2013103 (2007)","DOI":"10.1109\/FOCS.2007.66"}],"container-title":["Lecture Notes in Computer Science","Cyber Security Cryptography and Machine Learning"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60080-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T11:24:00Z","timestamp":1569410640000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60080-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319600796","9783319600802"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60080-2_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}