{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T03:46:25Z","timestamp":1769053585043,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":74,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,27]],"date-time":"2019-10-27T00:00:00Z","timestamp":1572134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1513694"],"award-info":[{"award-number":["CNS-1513694"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,27]]},"DOI":"10.1145\/3341301.3359660","type":"proceedings-article","created":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T13:34:22Z","timestamp":1571664862000},"page":"196-210","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Honeycrisp"],"prefix":"10.1145","author":[{"given":"Edo","family":"Roth","sequence":"first","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Daniel","family":"Noble","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Brett Hemenway","family":"Falk","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Andreas","family":"Haeberlen","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]}],"member":"320","published-online":{"date-parts":[[2019,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_9"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2015-0016"},{"key":"e_1_3_2_1_3_1","unstructured":"A. Aly M. Keller D. Rotaru P. Scholl N. P. Smart and T. Wood. SCALE-MAMBA software. https:\/\/homes.esat.kuleuven.be\/~nsmart\/SCALE\/ 2018.  A. Aly M. Keller D. Rotaru P. Scholl N. P. Smart and T. Wood. SCALE-MAMBA software. https:\/\/homes.esat.kuleuven.be\/~nsmart\/SCALE\/ 2018."},{"key":"e_1_3_2_1_4_1","unstructured":"Apple. Apple reports first quarter results. Press release February 2018; https:\/\/www.apple.com\/newsroom\/2018\/02\/apple-reports-first-quarter-results\/.  Apple. Apple reports first quarter results. Press release February 2018; https:\/\/www.apple.com\/newsroom\/2018\/02\/apple-reports-first-quarter-results\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Apple. Differential privacy. https:\/\/images.apple.com\/privacy\/docs\/Differential_Privacy_Overview.pdf.  Apple. Differential privacy. https:\/\/images.apple.com\/privacy\/docs\/Differential_Privacy_Overview.pdf."},{"key":"e_1_3_2_1_6_1","unstructured":"Apple. Reports on government information requests. https:\/\/www.apple.com\/legal\/transparency\/report-pdf.html.  Apple. Reports on government information requests. https:\/\/www.apple.com\/legal\/transparency\/report-pdf.html."},{"key":"e_1_3_2_1_7_1","unstructured":"Apple. A message to our customers. https:\/\/www.apple.com\/customer-letter\/ Feb. 2016.  Apple. A message to our customers. https:\/\/www.apple.com\/customer-letter\/ Feb. 2016."},{"issue":"8","key":"e_1_3_2_1_8_1","article-title":"Learning with privacy at scale","volume":"1","author":"Privacy Team Apple Differential","year":"2017","journal-title":"Apple Machine Learning Journal"},{"key":"e_1_3_2_1_9_1","volume-title":"RFC Editor","author":"Laurie E. K. B.","year":"2013"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. USENIX Security","author":"Ben-Sasson E.","year":"2014"},{"key":"e_1_3_2_1_11_1","unstructured":"A. Bhowmick J. Duchi J. Freudiger G. Kapoor and R. Rogers. Protection against reconstruction and its applications in private federated learning. arXiv:1812.00984 [cs stat] Dec. 2018.  A. Bhowmick J. Duchi J. Freudiger G. Kapoor and R. Rogers. Protection against reconstruction and its applications in private federated learning. arXiv:1812.00984 [cs stat] Dec. 2018."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029829"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132769"},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. SysML","author":"Bonawitz K.","year":"2019"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"E. Boyle G. Couteau N. Gilboa Y. Ishai L. Kohl and P. Scholl. Efficient pseudorandom correlation generators: Silent OT extension and more. IACR Cryptology ePrint Archive 2019:448 2019.  E. Boyle G. Couteau N. Gilboa Y. Ishai L. Kohl and P. Scholl. Efficient pseudorandom correlation generators: Silent OT extension and more. IACR Cryptology ePrint Archive 2019:448 2019.","DOI":"10.1007\/978-3-030-26954-8_16"},{"key":"e_1_3_2_1_17_1","unstructured":"C. Buckler. Average page weight increases 15% in 2014 Dec. 2014. https:\/\/www.sitepoint.com\/average-page-weight-increases-15-2014\/.  C. Buckler. Average page weight increases 15% in 2014 Dec. 2014. https:\/\/www.sitepoint.com\/average-page-weight-increases-15-2014\/."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1525856.1525858"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043621.2043626"},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. NSDI","author":"Chen R.","year":"2012"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"A. R. Chowdhury C. Wang X. He A. Machanavajjhala and S. Jha. Outis: Crypto-Assisted Differential Privacy on Untrusted Servers. arXiv:1902.07756 [cs] Feb. 2019.  A. R. Chowdhury C. Wang X. He A. Machanavajjhala and S. Jha. Outis: Crypto-Assisted Differential Privacy on Untrusted Servers. arXiv:1902.07756 [cs] Feb. 2019.","DOI":"10.1145\/3318464.3380596"},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. NSDI","author":"Corrigan-Gibbs H.","year":"2017"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2516930.2516944"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/118209.118237"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536467"},{"key":"e_1_3_2_1_28_1","volume-title":"Now Publishers Inc","author":"Dwork C.","year":"2014"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.12"},{"issue":"4","key":"e_1_3_2_1_30_1","first-page":"359","article-title":"What to do about bad language on the internet","volume":"2013","author":"Eisenstein J.","year":"2013","journal-title":"NAACL-HLT"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975482.151"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"G. Fanti V. Pihur and U. Erlingsson. Building a RAPPOR with the Unknown: Privacy-Preserving Learning of Associations and Data Dictionaries. arXiv:1503.01214 [cs] Mar. 2015.  G. Fanti V. Pihur and U. Erlingsson. Building a RAPPOR with the Unknown: Privacy-Preserving Learning of Associations and Data Dictionaries. arXiv:1503.01214 [cs] Mar. 2015.","DOI":"10.1515\/popets-2016-0015"},{"key":"e_1_3_2_1_34_1","volume-title":"Proc. USENIX ATC","author":"Ford B.","year":"2005"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586137"},{"key":"e_1_3_2_1_36_1","volume-title":"Hubaux. UnLynx: A Decentralized System for Privacy-Conscious Data Sharing. In Proc. PETS","author":"Froelicher D.","year":"2017"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2484326"},{"key":"e_1_3_2_1_39_1","volume-title":"Proc. USENIX Security","author":"Haeberlen A.","year":"2011"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_8"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"S. Halevi Y. Lindell and B. Pinkas. Secure computation on the web: Computing without simultaneous interaction. IACR ePrint 2011\/157 2011.  S. Halevi Y. Lindell and B. Pinkas. Secure computation on the web: Computing without simultaneous interaction. IACR ePrint 2011\/157 2011.","DOI":"10.1007\/978-3-642-22792-9_8"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.31"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2014.35"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31680-7_12"},{"key":"e_1_3_2_1_45_1","volume-title":"Proc. NIPS","author":"Joseph M.","year":"2018"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_10"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21548-4_11"},{"key":"e_1_3_2_1_48_1","volume-title":"Proc. USENIX Security","author":"Kreuter B.","year":"2012"},{"key":"e_1_3_2_1_49_1","unstructured":"KU Leuven COSIC. SCALE-MAMBA. https:\/\/github.com\/KULeuven-COSIC\/SCALE-MAMBA.  KU Leuven COSIC. SCALE-MAMBA. https:\/\/github.com\/KULeuven-COSIC\/SCALE-MAMBA."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22263-4_10"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486002"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26823-1_1"},{"key":"e_1_3_2_1_53_1","unstructured":"LWE estimator tool. https:\/\/bitbucket.org\/malb\/lwe-estimator\/ commit 3019847.  LWE estimator tool. https:\/\/bitbucket.org\/malb\/lwe-estimator\/ commit 3019847."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23175"},{"key":"e_1_3_2_1_57_1","volume-title":"Proc. CRYPTO","author":"Merkle R. C.","year":"1987"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382264"},{"key":"e_1_3_2_1_59_1","volume-title":"Forbes.","author":"Morris I.","year":"2017"},{"key":"e_1_3_2_1_60_1","volume-title":"Proc. OSDI","author":"Narayan A.","year":"2012"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064218"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046781"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807247"},{"issue":"2","key":"e_1_3_2_1_65_1","first-page":"300","article-title":"Polynomial codes over certain finite fields","volume":"8","author":"Reed I. S.","year":"1960","journal-title":"SIAM Journal"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806794"},{"key":"e_1_3_2_1_68_1","volume-title":"Proc. NSDI","author":"Roy I.","year":"2010"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_70_1","volume-title":"Proc. NDSS","author":"Shi E.","year":"2011"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.45"},{"key":"e_1_3_2_1_72_1","unstructured":"J. Tang A. Korolova X. Bai X. Wang and X. Wang. Privacy loss in Apple's implementation of differential privacy on MacOS 10.12 2017. https:\/\/arxiv.org\/pdf\/1709.02753.pdf.  J. Tang A. Korolova X. Bai X. Wang and X. Wang. Privacy loss in Apple's implementation of differential privacy on MacOS 10.12 2017. https:\/\/arxiv.org\/pdf\/1709.02753.pdf."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133979"},{"key":"e_1_3_2_1_74_1","first-page":"2019","volume-title":"Business Insider","author":"Wolverton T.","year":"2019"},{"key":"e_1_3_2_1_75_1","volume-title":"Proc. FOCS","author":"Yao A.","year":"1982"}],"event":{"name":"SOSP '19: ACM SIGOPS 27th Symposium on Operating Systems Principles","location":"Huntsville Ontario Canada","acronym":"SOSP '19","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 27th ACM Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341301.3359660","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341301.3359660","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341301.3359660","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:56Z","timestamp":1750201976000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341301.3359660"}},"subtitle":["large-scale differentially private aggregation without a trusted core"],"short-title":[],"issued":{"date-parts":[[2019,10,27]]},"references-count":74,"alternative-id":["10.1145\/3341301.3359660","10.1145\/3341301"],"URL":"https:\/\/doi.org\/10.1145\/3341301.3359660","relation":{},"subject":[],"published":{"date-parts":[[2019,10,27]]},"assertion":[{"value":"2019-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}