Research Article
Key-Value Data Collection with Distribution Estimation under Local Differential Privacy
| | Input: The sampled key-value pair , privacy budget | | | Output: Perturbed result | | (1) | Encode as vector | | (2) | Perturb as by (2) | | (3) | if then | | (4) | Perturb as by (3) | | (5) | end if | | (6) | if then | | (7) | Generate fake value | | (8) | end if | | (9) | if then | | (10) | | | (11) | end if | | (12) | return . |
|