Differential privacy implicitly assumes that the attacker has infinite computing power. This is unrealistic in practice, so it is natural to consider attackers with only polynomial computing power. This chapter of the Brief gives an overview of the corresponding notions.
CITATION STYLE
Pejó, B., & Desfontaines, D. (2022). Computational Power (C). In SpringerBriefs in Computer Science (pp. 55–57). Springer. https://doi.org/10.1007/978-3-030-96398-9_9
Mendeley helps you to discover research relevant for your work.