Research Article
Key-Value Data Collection with Distribution Estimation under Local Differential Privacy
| Input: The sampled key-value pair , privacy budget | | Output: Perturbed result | (1) | Encode as vector | (2) | Perturb as by (2) | (3) | if then | (4) | Perturb as by (3) | (5) | end if | (6) | if then | (7) | Generate fake value | (8) | end if | (9) | if then | (10) | | (11) | end if | (12) | return . |
|