User profiles for Guy N. Rothblum

Guy Rothblum

Weizmann Institute of Science
Verified email at alum.mit.edu
Cited by 9970

Boosting and differential privacy

C Dwork, GN Rothblum… - 2010 IEEE 51st Annual …, 2010 - ieeexplore.ieee.org
Boosting is a general method for improving the accuracy of learning algorithms. We use
boosting to construct improved privacy-pre serving synopses of an input database. These are …

Delegating computation: interactive proofs for muggles

S Goldwasser, YT Kalai, GN Rothblum - Journal of the ACM (JACM), 2015 - dl.acm.org
In this work we study interactive proofs for tractable languages. The (honest) prover should
be efficient and run in polynomial time or, in other words, a “muggle”.1 The verifier should be …

Differential privacy under continual observation

C Dwork, M Naor, T Pitassi, GN Rothblum - Proceedings of the forty …, 2010 - dl.acm.org
Differential privacy is a recent notion of privacy tailored to privacy-preserving data analysis [11].
Up to this point, research on differentially private data analysis has focused on the …

Concentrated differential privacy

C Dwork, GN Rothblum - arXiv preprint arXiv:1603.01887, 2016 - arxiv.org
… More generally, we prove the following Advanced Composition theorem, which improves
on the composition theorem of Dwork, Rothblum, and Vadhan [DRV10] by exactly halving …

On the complexity of differentially private data release: efficient algorithms and hardness results

C Dwork, M Naor, O Reingold, GN Rothblum… - Proceedings of the forty …, 2009 - dl.acm.org
We consider private data analysis in the setting in which a trusted and trustworthy curator,
having obtained a large data set containing private information, releases to the public a "…

A multiplicative weights mechanism for privacy-preserving data analysis

M Hardt, GN Rothblum - 2010 IEEE 51st annual symposium on …, 2010 - ieeexplore.ieee.org
We consider statistical data analysis in the interactive setting. In this setting a trusted curator
maintains a database of sensitive information about individual participants, and releases …

One-time programs

S Goldwasser, YT Kalai, GN Rothblum - … Barbara, CA, USA, August 17-21 …, 2008 - Springer
In this work, we introduce one-time programs, a new computational paradigm geared towards
security applications. A one-time program can be executed on a single input, whose value …

On best-possible obfuscation

S Goldwasser, GN Rothblum - Theory of Cryptography: 4th Theory of …, 2007 - Springer
An obfuscator is a compiler that transforms any program (which we will view in this work as
a boolean circuit) into an obfuscated program (also a circuit) that has the same input-output …

Virtual black-box obfuscation for all circuits via generic graded encoding

Z Brakerski, GN Rothblum - Theory of Cryptography Conference, 2014 - Springer
We present a new general-purpose obfuscator for all polynomial size circuits. The obfuscator
uses graded encoding schemes, a generalization of multilinear maps. We prove that the …

Constant-round interactive proofs for delegating computation

O Reingold, GN Rothblum, RD Rothblum - Proceedings of the forty …, 2016 - dl.acm.org
… (n)-time and O(nδ)-space Turing Machine that operates on inputs of length n and witnesses
of length m = poly(n). … Rothblum. How to delegate computations: the power of no-signaling …