A Generalized Constraint of Privacy: <inline-formula> <tex-math notation="LaTeX">$\alpha$ </tex-math></inline-formula>-Mutual Information Security

We study the security of a variety of cryptographic tasks including traditional privacy (e.g., seeded extractors, encryptions, commitments, and secret sharing schemes) and differential privacy from the perspective of &#x03B1;-mutual information. As far as we know, encryption scheme, commitment,...

Full description

Bibliographic Details
Main Author: Yanqing Yao
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8672471/