Vis enkel innførsel

dc.contributor.authorVinterbo, Staal
dc.date.accessioned2019-04-25T11:01:45Z
dc.date.available2019-04-25T11:01:45Z
dc.date.created2018-10-18T13:28:47Z
dc.date.issued2018
dc.identifier.citationLecture Notes in Computer Science. 2018, LNCS 11060 192-209.nb_NO
dc.identifier.issn0302-9743
dc.identifier.urihttp://hdl.handle.net/11250/2595478
dc.description.abstractRandomized response is attractive for privacy preserving data collection because the provided privacy can be quantified by means such as differential privacy. However, recovering and analyzing statistics involving multiple dependent randomized binary attributes can be difficult, posing a significant barrier to use. In this work, we address this problem by identifying and analyzing a family of response randomizers that change each binary attribute independently with the same probability. Modes of Google’s Rappor randomizer as well as applications of two well-known classical randomized response methods, Warner’s original method and Simmons’ unrelated question method, belong to this family. We show that randomizers in this family transform multinomial distribution parameters by an iterated Kronecker product of an invertible and bisymmetric 2 × 2 matrix. This allows us to present a simple and efficient algorithm for obtaining unbiased maximum likelihood parameter estimates for k-way marginals from randomized responses and provide theoretical bounds on the statistical efficiency achieved. We also describe the efficiency – differential privacy tradeoff. Importantly, both randomization of responses and the estimation algorithm are simple to implement, an aspect critical to technologies for privacy protection and security.nb_NO
dc.language.isoengnb_NO
dc.publisherSpringer Verlagnb_NO
dc.titleA Simple Algorithm for Estimating Distribution Parameters from n -Dimensional Randomized Binary Responsesnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber192-209nb_NO
dc.source.volumeLNCS 11060nb_NO
dc.source.journalLecture Notes in Computer Sciencenb_NO
dc.identifier.doi10.1007/978-3-319-99136-8_11
dc.identifier.cristin1621407
dc.description.localcodeThis is a post-peer-review, pre-copyedit version of an article published in [Lecture Notes in Computer Science] Locked until 15.8.2019 due to copyright restrictions. The final authenticated version is available online at: https://doi.org/10.1007/978-3-319-99136-8_11nb_NO
cristin.unitcode194,63,30,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel