Research Article

Key-Value Data Collection with Distribution Estimation under Local Differential Privacy

Algorithm 2

Perturbation.
Input: The sampled key-value pair , privacy budget
Output: Perturbed result
(1)Encode as vector
(2)Perturb as by (2)
(3)if then
(4) Perturb as by (3)
(5)end if
(6)if then
(7) Generate fake value
(8)end if
(9)if then
(10)
(11)end if
(12)return .