Adversaries beyond neglect: a stroll through the garden of differential privacy
Abstract: We have a clear understanding about how to handle information security in cryptographic cases where adversaries (provably) have a negligible chance of success. Definitions are solid and all is well. However, in many cases relevant for privacy, we cannot achieve such strong notions without paying outrageous costs: a utility approaching zero, vast communication costs,