{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2015:4IAM725KKSS5PN2R42M7PUQPD7","short_pith_number":"pith:4IAM725K","canonical_record":{"source":{"id":"1507.00056","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DS","submitted_at":"2015-06-30T22:46:35Z","cross_cats_sorted":[],"title_canon_sha256":"fe67282a55294000979b85b7984bb7d75c2cb1762a0176063fade466ac3a0982","abstract_canon_sha256":"a8063d0013e9eb7eceeea38694ec13c2a6b1d9303b28fd7fe31efc4811cc6dc5"},"schema_version":"1.0"},"canonical_sha256":"e200cfebaa54a5d7b751e699f7d20f1fd95d49cc017132b273eba3e1c62938dc","source":{"kind":"arxiv","id":"1507.00056","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1507.00056","created_at":"2026-05-18T01:26:02Z"},{"alias_kind":"arxiv_version","alias_value":"1507.00056v2","created_at":"2026-05-18T01:26:02Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1507.00056","created_at":"2026-05-18T01:26:02Z"},{"alias_kind":"pith_short_12","alias_value":"4IAM725KKSS5","created_at":"2026-05-18T12:29:05Z"},{"alias_kind":"pith_short_16","alias_value":"4IAM725KKSS5PN2R","created_at":"2026-05-18T12:29:05Z"},{"alias_kind":"pith_short_8","alias_value":"4IAM725K","created_at":"2026-05-18T12:29:05Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2015:4IAM725KKSS5PN2R42M7PUQPD7","target":"record","payload":{"canonical_record":{"source":{"id":"1507.00056","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DS","submitted_at":"2015-06-30T22:46:35Z","cross_cats_sorted":[],"title_canon_sha256":"fe67282a55294000979b85b7984bb7d75c2cb1762a0176063fade466ac3a0982","abstract_canon_sha256":"a8063d0013e9eb7eceeea38694ec13c2a6b1d9303b28fd7fe31efc4811cc6dc5"},"schema_version":"1.0"},"canonical_sha256":"e200cfebaa54a5d7b751e699f7d20f1fd95d49cc017132b273eba3e1c62938dc","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:26:02.703225Z","signature_b64":"oTTa5GKO7bpfvnBjAXl5StrcQdw1DmLwLZ6i4LAe8RMAjPcVvo1t5Zma7dw6jIWFYdXolOBPzTZ7E3GEtnOuDg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"e200cfebaa54a5d7b751e699f7d20f1fd95d49cc017132b273eba3e1c62938dc","last_reissued_at":"2026-05-18T01:26:02.702764Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:26:02.702764Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1507.00056","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:26:02Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"hDpAO9fG9lNx7KJ9dfHYvpq501+YgcQTEYWsOx1Pk7vXwWnCghz1U88slya7BwE08bdWQx9IV5G/PcYmPvNNDQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T12:53:18.630134Z"},"content_sha256":"57f6357180c8fc5385e2db70dd4e99f3baa27dcd72450914643751ca9255e1c4","schema_version":"1.0","event_id":"sha256:57f6357180c8fc5385e2db70dd4e99f3baa27dcd72450914643751ca9255e1c4"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2015:4IAM725KKSS5PN2R42M7PUQPD7","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Private Approximations of the 2nd-Moment Matrix Using Existing Techniques in Linear Regression","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.DS","authors_text":"Or Sheffet","submitted_at":"2015-06-30T22:46:35Z","abstract_excerpt":"We introduce three differentially-private algorithms that approximates the 2nd-moment matrix of the data. These algorithm, which in contrast to existing algorithms output positive-definite matrices, correspond to existing techniques in linear regression literature. Specifically, we discuss the following three techniques. (i) For Ridge Regression, we propose setting the regularization coefficient so that by approximating the solution using Johnson-Lindenstrauss transform we preserve privacy. (ii) We show that adding a small batch of random samples to our data preserves differential privacy. (ii"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1507.00056","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:26:02Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"QNqYg1xD4AAEA+2SpWv7Hj4rexv0SDHV5YcRyxLaM0fBYzWGZsSsozsfMVcejYDEkCkNeUbMGgAOWazHO5ImCQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T12:53:18.630534Z"},"content_sha256":"4d46c4b5cced60177b302980255a5fc38c68be1fdf2c5fe08fa837c9a684fd94","schema_version":"1.0","event_id":"sha256:4d46c4b5cced60177b302980255a5fc38c68be1fdf2c5fe08fa837c9a684fd94"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/4IAM725KKSS5PN2R42M7PUQPD7/bundle.json","state_url":"https://pith.science/pith/4IAM725KKSS5PN2R42M7PUQPD7/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/4IAM725KKSS5PN2R42M7PUQPD7/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T12:53:18Z","links":{"resolver":"https://pith.science/pith/4IAM725KKSS5PN2R42M7PUQPD7","bundle":"https://pith.science/pith/4IAM725KKSS5PN2R42M7PUQPD7/bundle.json","state":"https://pith.science/pith/4IAM725KKSS5PN2R42M7PUQPD7/state.json","well_known_bundle":"https://pith.science/.well-known/pith/4IAM725KKSS5PN2R42M7PUQPD7/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2015:4IAM725KKSS5PN2R42M7PUQPD7","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"a8063d0013e9eb7eceeea38694ec13c2a6b1d9303b28fd7fe31efc4811cc6dc5","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DS","submitted_at":"2015-06-30T22:46:35Z","title_canon_sha256":"fe67282a55294000979b85b7984bb7d75c2cb1762a0176063fade466ac3a0982"},"schema_version":"1.0","source":{"id":"1507.00056","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1507.00056","created_at":"2026-05-18T01:26:02Z"},{"alias_kind":"arxiv_version","alias_value":"1507.00056v2","created_at":"2026-05-18T01:26:02Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1507.00056","created_at":"2026-05-18T01:26:02Z"},{"alias_kind":"pith_short_12","alias_value":"4IAM725KKSS5","created_at":"2026-05-18T12:29:05Z"},{"alias_kind":"pith_short_16","alias_value":"4IAM725KKSS5PN2R","created_at":"2026-05-18T12:29:05Z"},{"alias_kind":"pith_short_8","alias_value":"4IAM725K","created_at":"2026-05-18T12:29:05Z"}],"graph_snapshots":[{"event_id":"sha256:4d46c4b5cced60177b302980255a5fc38c68be1fdf2c5fe08fa837c9a684fd94","target":"graph","created_at":"2026-05-18T01:26:02Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"We introduce three differentially-private algorithms that approximates the 2nd-moment matrix of the data. These algorithm, which in contrast to existing algorithms output positive-definite matrices, correspond to existing techniques in linear regression literature. Specifically, we discuss the following three techniques. (i) For Ridge Regression, we propose setting the regularization coefficient so that by approximating the solution using Johnson-Lindenstrauss transform we preserve privacy. (ii) We show that adding a small batch of random samples to our data preserves differential privacy. (ii","authors_text":"Or Sheffet","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DS","submitted_at":"2015-06-30T22:46:35Z","title":"Private Approximations of the 2nd-Moment Matrix Using Existing Techniques in Linear Regression"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1507.00056","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:57f6357180c8fc5385e2db70dd4e99f3baa27dcd72450914643751ca9255e1c4","target":"record","created_at":"2026-05-18T01:26:02Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"a8063d0013e9eb7eceeea38694ec13c2a6b1d9303b28fd7fe31efc4811cc6dc5","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DS","submitted_at":"2015-06-30T22:46:35Z","title_canon_sha256":"fe67282a55294000979b85b7984bb7d75c2cb1762a0176063fade466ac3a0982"},"schema_version":"1.0","source":{"id":"1507.00056","kind":"arxiv","version":2}},"canonical_sha256":"e200cfebaa54a5d7b751e699f7d20f1fd95d49cc017132b273eba3e1c62938dc","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"e200cfebaa54a5d7b751e699f7d20f1fd95d49cc017132b273eba3e1c62938dc","first_computed_at":"2026-05-18T01:26:02.702764Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:26:02.702764Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"oTTa5GKO7bpfvnBjAXl5StrcQdw1DmLwLZ6i4LAe8RMAjPcVvo1t5Zma7dw6jIWFYdXolOBPzTZ7E3GEtnOuDg==","signature_status":"signed_v1","signed_at":"2026-05-18T01:26:02.703225Z","signed_message":"canonical_sha256_bytes"},"source_id":"1507.00056","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:57f6357180c8fc5385e2db70dd4e99f3baa27dcd72450914643751ca9255e1c4","sha256:4d46c4b5cced60177b302980255a5fc38c68be1fdf2c5fe08fa837c9a684fd94"],"state_sha256":"096bc30dfe1c4dfd71fc0a22acae4d94be5c4877cbf6e02623365138540d323c"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"zG58P9Txc21r8nbZvbCW2g2Iw3+5pdyB+uPHoENv5dVqRzeLYFVZz8p06FkE0fRis+Myb3lYLwaWxo8pR3jDCw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T12:53:18.632936Z","bundle_sha256":"8f2f8cfa20d5f81c28d2480179f41191dccc54a0f16687392030d523c76efba4"}}