{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2014:ADZGQMAB2UAY37TL3JSAJ6ZARF","short_pith_number":"pith:ADZGQMAB","schema_version":"1.0","canonical_sha256":"00f2683001d5018dfe6bda6404fb20895023a14f8b11217c73c847499362bda8","source":{"kind":"arxiv","id":"1402.1774","version":5},"attestation_state":"computed","paper":{"title":"From the Information Bottleneck to the Privacy Funnel","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Ali Makhdoumi, Muriel Medard, Nadia Fawaz, Salman Salamatian","submitted_at":"2014-02-07T21:23:10Z","abstract_excerpt":"We focus on the privacy-utility trade-off encountered by users who wish to disclose some information to an analyst, that is correlated with their private data, in the hope of receiving some utility. We rely on a general privacy statistical inference framework, under which data is transformed before it is disclosed, according to a probabilistic privacy mapping. We show that when the log-loss is introduced in this framework in both the privacy metric and the distortion metric, the privacy leakage and the utility constraint can be reduced to the mutual information between private data and disclos"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1402.1774","kind":"arxiv","version":5},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2014-02-07T21:23:10Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"d2493a4ca4e167e6c12cb12d9899cd58e195d427d4e45be51ff954d31ba5a4e1","abstract_canon_sha256":"74f9289a44d26c5648d7df5606427359ef9cc186d6a6ae2d5835bb42787d3fe8"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T02:41:26.102565Z","signature_b64":"rUwgXALtJb2YgOv4CAsuIdI8aYCFu8VgAyH4oeqJ+h2UliWikXhCmP1hsxP2mLPzYfOxBNg1Orc7A7UD+4LNBQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"00f2683001d5018dfe6bda6404fb20895023a14f8b11217c73c847499362bda8","last_reissued_at":"2026-05-18T02:41:26.102119Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T02:41:26.102119Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"From the Information Bottleneck to the Privacy Funnel","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Ali Makhdoumi, Muriel Medard, Nadia Fawaz, Salman Salamatian","submitted_at":"2014-02-07T21:23:10Z","abstract_excerpt":"We focus on the privacy-utility trade-off encountered by users who wish to disclose some information to an analyst, that is correlated with their private data, in the hope of receiving some utility. We rely on a general privacy statistical inference framework, under which data is transformed before it is disclosed, according to a probabilistic privacy mapping. We show that when the log-loss is introduced in this framework in both the privacy metric and the distortion metric, the privacy leakage and the utility constraint can be reduced to the mutual information between private data and disclos"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1402.1774","kind":"arxiv","version":5},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1402.1774","created_at":"2026-05-18T02:41:26.102180+00:00"},{"alias_kind":"arxiv_version","alias_value":"1402.1774v5","created_at":"2026-05-18T02:41:26.102180+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1402.1774","created_at":"2026-05-18T02:41:26.102180+00:00"},{"alias_kind":"pith_short_12","alias_value":"ADZGQMAB2UAY","created_at":"2026-05-18T12:28:19.803747+00:00"},{"alias_kind":"pith_short_16","alias_value":"ADZGQMAB2UAY37TL","created_at":"2026-05-18T12:28:19.803747+00:00"},{"alias_kind":"pith_short_8","alias_value":"ADZGQMAB","created_at":"2026-05-18T12:28:19.803747+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":1,"internal_anchor_count":0,"sample":[{"citing_arxiv_id":"2605.12168","citing_title":"On What We Can Learn from Low-Resolution Data","ref_index":42,"is_internal_anchor":false}]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/ADZGQMAB2UAY37TL3JSAJ6ZARF","json":"https://pith.science/pith/ADZGQMAB2UAY37TL3JSAJ6ZARF.json","graph_json":"https://pith.science/api/pith-number/ADZGQMAB2UAY37TL3JSAJ6ZARF/graph.json","events_json":"https://pith.science/api/pith-number/ADZGQMAB2UAY37TL3JSAJ6ZARF/events.json","paper":"https://pith.science/paper/ADZGQMAB"},"agent_actions":{"view_html":"https://pith.science/pith/ADZGQMAB2UAY37TL3JSAJ6ZARF","download_json":"https://pith.science/pith/ADZGQMAB2UAY37TL3JSAJ6ZARF.json","view_paper":"https://pith.science/paper/ADZGQMAB","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1402.1774&json=true","fetch_graph":"https://pith.science/api/pith-number/ADZGQMAB2UAY37TL3JSAJ6ZARF/graph.json","fetch_events":"https://pith.science/api/pith-number/ADZGQMAB2UAY37TL3JSAJ6ZARF/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/ADZGQMAB2UAY37TL3JSAJ6ZARF/action/timestamp_anchor","attest_storage":"https://pith.science/pith/ADZGQMAB2UAY37TL3JSAJ6ZARF/action/storage_attestation","attest_author":"https://pith.science/pith/ADZGQMAB2UAY37TL3JSAJ6ZARF/action/author_attestation","sign_citation":"https://pith.science/pith/ADZGQMAB2UAY37TL3JSAJ6ZARF/action/citation_signature","submit_replication":"https://pith.science/pith/ADZGQMAB2UAY37TL3JSAJ6ZARF/action/replication_record"}},"created_at":"2026-05-18T02:41:26.102180+00:00","updated_at":"2026-05-18T02:41:26.102180+00:00"}