### Skapa referens, olika format (klipp och klistra)

**Harvard**

Brunetta, C., Dimitrakakis, C., Liang, B. och Mitrokotsa, A. (2017) *A Differentially Private Encryption Scheme*.

** BibTeX **

@conference{

Brunetta2017,

author={Brunetta, Carlo and Dimitrakakis, Christos and Liang, Bei and Mitrokotsa, Aikaterini},

title={A Differentially Private Encryption Scheme},

booktitle={Lecture Notes in Computer Science: 20th International Conference on Information Security, ISC 2017; Ho Chi Minh City; Viet Nam; 22 November 2017 through 24 November 2017},

isbn={978-331969658-4},

pages={309-326},

abstract={Encrypting data with a semantically secure cryptosystem guarantees that nothing is learned about the plaintext from the ciphertext. However, querying a database about individuals or requesting for summary statistics can leak information. Differential privacy (DP) offers a formal framework to bound the amount of information that an adversary can discover from a database with private data, when statistical findings of the stored data are communicated to an untrusted party. Although both encryption schemes and differential private mechanisms can provide important privacy guarantees, when employed in isolation they do not guarantee full privacy-preservation. This paper investigates how to efficiently combine DP and an encryption scheme to prevent leakage of information. More precisely, we introduce and instantiate differentially private encryption schemes that provide both DP and confidentiality. Our contributions are five-fold, we: (i) define an encryption scheme that is not correct with some probability i.e., an -correct encryption scheme and we prove that it satisfies the DP definition; (ii) prove that combining DP and encryption, is equivalent to using an -correct encryption scheme and provide a construction to build one from the other; (iii) prove that an encryption scheme that belongs in the DP-then-Encrypt class is at least as computationally secure as the original base encryption scheme; (iv) provide an -correct encryption scheme that achieves both requirements (i.e., DP and confidentiality) and relies on Dijk et al.’s homomorphic encryption scheme (EUROCRYPT 2010); and (v) perform some statistical experiments on our encryption scheme in order to empirically check the correctness of the theoretical results.},

year={2017},

keywords={Differential privacy; Encryption; Homomorphic encryption},

}

** RefWorks **

RT Conference Proceedings

SR Electronic

ID 253794

A1 Brunetta, Carlo

A1 Dimitrakakis, Christos

A1 Liang, Bei

A1 Mitrokotsa, Aikaterini

T1 A Differentially Private Encryption Scheme

YR 2017

T2 Lecture Notes in Computer Science: 20th International Conference on Information Security, ISC 2017; Ho Chi Minh City; Viet Nam; 22 November 2017 through 24 November 2017

SN 978-331969658-4

SP 309

OP 326

AB Encrypting data with a semantically secure cryptosystem guarantees that nothing is learned about the plaintext from the ciphertext. However, querying a database about individuals or requesting for summary statistics can leak information. Differential privacy (DP) offers a formal framework to bound the amount of information that an adversary can discover from a database with private data, when statistical findings of the stored data are communicated to an untrusted party. Although both encryption schemes and differential private mechanisms can provide important privacy guarantees, when employed in isolation they do not guarantee full privacy-preservation. This paper investigates how to efficiently combine DP and an encryption scheme to prevent leakage of information. More precisely, we introduce and instantiate differentially private encryption schemes that provide both DP and confidentiality. Our contributions are five-fold, we: (i) define an encryption scheme that is not correct with some probability i.e., an -correct encryption scheme and we prove that it satisfies the DP definition; (ii) prove that combining DP and encryption, is equivalent to using an -correct encryption scheme and provide a construction to build one from the other; (iii) prove that an encryption scheme that belongs in the DP-then-Encrypt class is at least as computationally secure as the original base encryption scheme; (iv) provide an -correct encryption scheme that achieves both requirements (i.e., DP and confidentiality) and relies on Dijk et al.’s homomorphic encryption scheme (EUROCRYPT 2010); and (v) perform some statistical experiments on our encryption scheme in order to empirically check the correctness of the theoretical results.

LA eng

DO 10.1007/978-3-319-69659-1_17

LK http://dx.doi.org/10.1007/978-3-319-69659-1_17

OL 30