{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T22:44:26Z","timestamp":1769121866418,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540851738","type":"print"},{"value":"9783540851745","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85174-5_26","type":"book-chapter","created":{"date-parts":[[2008,8,20]],"date-time":"2008-08-20T12:32:02Z","timestamp":1219235522000},"page":"469-480","source":"Crossref","is-referenced-by-count":48,"title":["New Efficient Attacks on Statistical Disclosure Control Mechanisms"],"prefix":"10.1007","author":[{"given":"Cynthia","family":"Dwork","sequence":"first","affiliation":[]},{"given":"Sergey","family":"Yekhanin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"26_CR1","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1145\/76894.76895","volume":"21","author":"N. Adam","year":"1989","unstructured":"Adam, N., Wortmann, J.: Security-control methods for statistical databases: a comparative study. ACM Computing Surveys\u00a021(4), 515\u2013556 (1989)","journal-title":"ACM Computing Surveys"},{"key":"26_CR2","doi-asserted-by":"crossref","DOI":"10.1002\/0471722154","volume-title":"The probabilistic method","author":"N. Alon","year":"2000","unstructured":"Alon, N., Spencer, J.: The probabilistic method, 2nd edn. Wiley-Interscience [John Wiley and sons], New York (2000)","edition":"2"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Barak, B., Chaudhuri, K., Dwork, C., Kale, S., McSherry, F., Talwar, K.: Privacy, accuracy, and consistency too: a holistic solution to contingency table release. In: Proc. of the 26th Symposium on Principles of Database Systems (PODS), pp. 273\u2013282 (2007)","DOI":"10.1145\/1265530.1265569"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Blum, A., Ligett, K., Roth, A.: A learning theory approach to non-interactive database privacy. In: Proc. of the Symp. on the Theory of Computation (STOC) (2008)","DOI":"10.1145\/1374376.1374464"},{"key":"26_CR5","doi-asserted-by":"publisher","first-page":"5406","DOI":"10.1109\/TIT.2006.885507","volume":"52","author":"E. Candes","year":"2004","unstructured":"Candes, E., Tao, T.: Near-optimal signal recovery from random projections: universal encoding strategies. IEEE Trans. Inform. Theory\u00a052, 5406\u20135425 (2004)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"26_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/978-3-540-30576-7_20","volume-title":"Theory of Cryptography","author":"S. Chawla","year":"2005","unstructured":"Chawla, S., Dwork, C., McSherry, F., Smith, A., Wee, H.: Toward privacy in public databases. In: Kilian, J. (ed.) TCC 2005. LNCS, vol.\u00a03378, pp. 363\u2013385. Springer, Heidelberg (2005)"},{"issue":"1","key":"26_CR7","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1137\/S1064827596304010","volume":"48","author":"S. Chen","year":"1999","unstructured":"Chen, S., Donoho, D., Saunders, M.: Atomic decomposition via basis pursuit. SIAM Journal on Scientific Computing\u00a048(1), 33\u201361 (1999)","journal-title":"SIAM Journal on Scientific Computing"},{"issue":"3","key":"26_CR8","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1214\/aos\/1024691081","volume":"26","author":"D. Donoho","year":"1998","unstructured":"Donoho, D., Johnstone, I.: Minimax estimation via wavelet shrinkage. Annals of Statistics\u00a026(3), 879\u2013921 (1998)","journal-title":"Annals of Statistics"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Blum, A., Dwork, C., McSherry, F., Nissim, K.: Practical privacy: the SuLQ framework. In: Proc. of the 24th Symposium on Principles of Database Systems (PODS), pp. 128\u2013138 (2005)","DOI":"10.1145\/1065167.1065184"},{"issue":"2","key":"26_CR10","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/772862.772867","volume":"4","author":"C. Clifton","year":"2002","unstructured":"Clifton, C., Kantarcioglu, M., Vaidya, J., Lin, X., Zhu, M.: Tool for privacy preserving data minining. SIGKDD Explorations\u00a04(2), 28\u201334 (2002)","journal-title":"SIGKDD Explorations"},{"key":"26_CR11","volume-title":"Introduction to algorithms","author":"T. Cormen","year":"2001","unstructured":"Cormen, T., Leiserson, C., Rivest, R., Stein, C.: Introduction to algorithms. MIT Press, Cambridge (2001)"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Dinur, I., Nissim, K.: Revealing information while preserving privacy. In: Proc. of the 22nd Symposium on Principles of Database Systems (PODS), pp. 202\u2013210 (2003)","DOI":"10.1145\/773153.773173"},{"key":"26_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C. Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol.\u00a04052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"26_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/11965893_2","volume-title":"Database Theory \u2013 ICDT 2007","author":"C. Dwork","year":"2006","unstructured":"Dwork, C.: Ask a better question, get a better answer: a new approach to private data analysis. In: Schwentick, T., Suciu, D. (eds.) ICDT 2007. LNCS, vol.\u00a04353, pp. 18\u201327. Springer, Heidelberg (2006)"},{"key":"26_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/11761679_29","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"C. Dwork","year":"2006","unstructured":"Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: privacy via distributed noise generation. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 486\u2013503. Springer, Heidelberg (2006)"},{"key":"26_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C. Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Callibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol.\u00a03876, pp. 265\u2013284. Springer, Heidelberg (2006)"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Dwork, C., McSherry, F., Talwar, K.: The price of privacy and the limits of LP decoding. In: Proc. of the 39th Symposium on the Theory of Computation (STOC), pp. 85\u201394 (2007)","DOI":"10.1145\/1250790.1250804"},{"key":"26_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1007\/978-3-540-28628-8_32","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"C. Dwork","year":"2004","unstructured":"Dwork, C., Nissim, K.: Privacy preserving data-mining on vertically partitioned databases. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 528\u2013544. Springer, Heidelberg (2004)"},{"issue":"4","key":"26_CR19","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/0020-0190(92)90195-2","volume":"43","author":"P. Gemmell","year":"1992","unstructured":"Gemmell, P., Sudan, M.: Highly resilient correctors for polynomials. Information Processing Letters\u00a043(4), 169\u2013174 (1992)","journal-title":"Information Processing Letters"},{"key":"26_CR20","doi-asserted-by":"crossref","unstructured":"Kasiviswanathan, S., Lee, H., Nissim, K., Raskhodnikova, S., Smith, A.: What Can We Learn Privately? (manuscript, 2007)","DOI":"10.1109\/FOCS.2008.27"},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"McSherry, F., Talwar, K.: Mechanism Design via Differential Privacy. In: Proc. of the 48th Symposium on the Foundations of Computer Science (FOCS) (2007)","DOI":"10.1109\/FOCS.2007.66"},{"key":"26_CR22","volume-title":"The theory of error-correcting codes","author":"F. MacWilliams","year":"1977","unstructured":"MacWilliams, F., Sloane, N.: The theory of error-correcting codes. North-Holland, Amsterdam (1977)"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Nissim, K., Raskhodnikova, S., Smith, A.: Smooth sensitivity and sampling in private data analysis. In: Proc. of the 39th Symposium on the Theory of Computation (STOC), pp. 75\u201384 (2007)","DOI":"10.1145\/1250790.1250803"},{"key":"26_CR24","unstructured":"Slavkovic, A.: Statistical disclosure limitation beyond the margins: characterization of joint distributions for contingency tables. Ph.D. thesis, Department of statistics, Carnegie Mellon University (2004)"},{"key":"26_CR25","unstructured":"Shoshani, A.: Statistical databases: Characteristics, problems and some solutiuons. In: Proc. of the 8th International Conference on Very Large Databases (VLDB), pp. 208\u2013222 (1982)"},{"issue":"2","key":"26_CR26","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1145\/1117454.1117464","volume":"7","author":"L. Sweeney","year":"2005","unstructured":"Sweeney, L.: Privacy-enchanced linking. SIGKDD Explorations\u00a07(2), 72\u201375 (2005)","journal-title":"SIGKDD Explorations"},{"key":"26_CR27","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/BF01580859","volume":"47","author":"P. Vaidya","year":"1990","unstructured":"Vaidya, P.: An algorithm for linear programming which requires O(((m\u2009+\u2009n)n 2\u2009+\u2009(m\u2009+\u2009n)1.5 n)L) arithmetic opertaions. Mathematical Programming\u00a047, 175\u2013201 (1990)","journal-title":"Mathematical Programming"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 CRYPTO 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85174-5_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:22:29Z","timestamp":1606184549000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85174-5_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540851738","9783540851745"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85174-5_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[]}}