{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T17:51:30Z","timestamp":1757699490951},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642371189"},{"type":"electronic","value":"9783642371196"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37119-6_25","type":"book-chapter","created":{"date-parts":[[2013,3,26]],"date-time":"2013-03-26T20:34:59Z","timestamp":1364330099000},"page":"374-381","source":"Crossref","is-referenced-by-count":12,"title":["Information-Theoretic Foundations of Differential Privacy"],"prefix":"10.1007","author":[{"given":"Darakhshan J.","family":"Mir","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Alvim, M.S., Andr\u00e9s, M.E., Chatzikokolakis, K., Degano, P., Palamidessi, C.: Differential privacy: On the trade-off between utility and information leakage. In: FST 2011 (2011)","DOI":"10.1007\/978-3-642-29420-4_3"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Barthe, G., Kopf, B.: Information-theoretic bounds for differentially private mechanisms. In: CSF 2011 (2011)","DOI":"10.1109\/CSF.2011.20"},{"issue":"3","key":"25_CR3","first-page":"199","volume":"3","author":"M. Bezzi","year":"2010","unstructured":"Bezzi, M.: An information theoretic approach for privacy metrics. TDP 2010\u00a03(3), 199\u2013215 (2010)","journal-title":"TDP 2010"},{"key":"25_CR4","unstructured":"Cover, T.M., Thomas, J.A.: Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing), 2nd edn. Wiley-Interscience (July 2006)"},{"key":"25_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C. Dwork","year":"2006","unstructured":"Dwork, C.: Differential Privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. LNCS, vol.\u00a04052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"25_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C. Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating Noise to Sensitivity in Private Data Analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol.\u00a03876, pp. 265\u2013284. Springer, Heidelberg (2006)"},{"key":"25_CR7","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1103\/PhysRev.108.171","volume":"108","author":"E.T. Jaynes","year":"1957","unstructured":"Jaynes, E.T.: Information theory and statistical mechanics. ii. Phys. Rev. 1957\u00a0108, 171\u2013190 (1957)","journal-title":"Phys. Rev. 1957"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T.: t-closeness: Privacy beyond k-anonymity and -diversity. In: ICDE 2007 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Li, Y.D., Zhang, Z., Winslett, M., Yang, Y.: Compressive mechanism: Utilizing sparse representation in differential privacy. CoRR, abs\/1107.3350 (2011)","DOI":"10.1145\/2046556.2046581"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"McGregor, A., Mironov, I., Pitassi, T., Reingold, O., Talwar, K., Vadhan, S.P.: The limits of two-party differential privacy. In: FOCS 2010 (2010)","DOI":"10.1109\/FOCS.2010.14"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Mcsherry, F., Talwar, K.: Mechanism design via differential privacy. In: FOCS 2007 (2007)","DOI":"10.1109\/FOCS.2007.66"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Mir, D.: Differentially-private learning and information theory. In: EDBT-ICDT-W 2012 (2012)","DOI":"10.1145\/2320765.2320823"},{"key":"25_CR13","first-page":"1623","volume":"22","author":"D. Rebollo-Monedero","year":"2010","unstructured":"Rebollo-Monedero, D., Forne, J., Domingo-Ferrer, J.: From t-closeness-like privacy to postrandomization via information theory. IEEE TKDE 2010\u00a022, 1623\u20131636 (2010)","journal-title":"IEEE TKDE 2010"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Sankar, L., Rajagopalan, S., Poor, H.: A theory of utility and privacy of data sources. In: ISIT 2010 (2010)","DOI":"10.1109\/ISIT.2010.5513684"},{"key":"25_CR15","first-page":"142","volume":"4","author":"C. Shannon","year":"1959","unstructured":"Shannon, C.: Coding theorems for a discrete source with a fidelity criterion. IRE National Convention Record, Part 4, 142\u2013163 (1959)","journal-title":"IRE National Convention Record, Part"},{"key":"25_CR16","unstructured":"Tishby, N., Pereira, F.C., Bialek, W.: The information bottleneck method. In: Allerton 1999 (1999)"},{"issue":"8","key":"25_CR17","doi-asserted-by":"publisher","first-page":"2971","DOI":"10.1109\/TIT.2007.901183","volume":"53","author":"P.L. Vora","year":"2007","unstructured":"Vora, P.L.: An information-theoretic approach to inference attacks on random data perturbation and a related privacy measure. IEEE Trans. Inf. Theor. 2007\u00a053(8), 2971\u20132977 (2007)","journal-title":"IEEE Trans. Inf. Theor. 2007"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37119-6_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,11]],"date-time":"2019-07-11T07:27:41Z","timestamp":1562830061000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37119-6_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642371189","9783642371196"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37119-6_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}