\relax 
\citation{19,20}
\citation{21,22}
\citation{17,18}
\citation{8,2,6,1}
\citation{10,8,1,15,9}
\citation{1}
\citation{2}
\citation{1}
\citation{6}
\citation{8,5,1}
\citation{11,4,12}
\citation{4,14,1}
\citation{13}
\citation{3}
\citation{7}
\@writefile{toc}{\contentsline {title}{Lecture Notes in Computer Science}{1}}
\@writefile{toc}{\authcount {1}}
\@writefile{toc}{\contentsline {author}{Authors' Instructions}{1}}
\@writefile{toc}{\contentsline {section}{\numberline {1}Introduction}{1}}
\citation{4}
\citation{7}
\citation{4}
\@writefile{toc}{\contentsline {section}{\numberline {2}Preliminaries }{2}}
\citation{8}
\citation{1}
\citation{2}
\citation{1}
\citation{6}
\@writefile{toc}{\contentsline {section}{\numberline {3}Separability, Expressivity and Their Implications}{3}}
\newlabel{sep}{{4}{3}}
\newlabel{lemma3}{{1}{3}}
\citation{4}
\citation{5}
\citation{4,5}
\citation{2}
\citation{2}
\citation{2}
\newlabel{his}{{3}{4}}
\citation{23}
\newlabel{bclth}{{3}{5}}
\newlabel{exp}{{6}{5}}
\newlabel{theorem1}{{1}{5}}
\newlabel{spee}{{1}{6}}
\@writefile{toc}{\contentsline {section}{\numberline {4} Impossibility of Privacy }{6}}
\citation{4,14}
\newlabel{expp}{{2}{7}}
\citation{3}
\newlabel{imp}{{2}{8}}
\@writefile{lot}{\contentsline {table}{\numberline {1}{\ignorespaces Values of $ \delta $ for which no $(\mathcal  {R}_n, \delta )-$secure cryptographic primitive $P$ exists.}}{8}}
\@writefile{toc}{\contentsline {section}{\numberline {5}On the Impossibility of Differential Privacy }{8}}
\newlabel{dp}{{11}{9}}
\newlabel{uti}{{12}{9}}
\newlabel{ap}{{13}{9}}
\newlabel{imdp}{{3}{9}}
\@writefile{toc}{\contentsline {paragraph}{ Implications to $\mathcal  {W}eak(k, n)$ and $\mathcal  {BCL}(\gamma , b, n)$: }{10}}
\@writefile{toc}{\contentsline {paragraph}{ Analysis for the SV Source: }{10}}
\newlabel{imsv}{{5}{10}}
\newlabel{uni}{{4}{10}}
\citation{3}
\bibcite{10}{1}
\bibcite{19}{2}
\bibcite{20}{3}
\bibcite{13}{4}
\bibcite{22}{5}
\bibcite{23}{6}
\@writefile{toc}{\contentsline {section}{\numberline {6} Comparison about the Impossibility of Privacy and Differential Privacy}{11}}
\@writefile{lot}{\contentsline {table}{\numberline {2}{\ignorespaces Comparison about the Impossibility of Privacy and Differential Privacy }}{11}}
\bibcite{8}{7}
\bibcite{2}{8}
\bibcite{11}{9}
\bibcite{6}{10}
\bibcite{3}{11}
\bibcite{4}{12}
\bibcite{21}{13}
\bibcite{7}{14}
\bibcite{17}{15}
\bibcite{18}{16}
\bibcite{14}{17}
\bibcite{12}{18}
\bibcite{5}{19}
\bibcite{1}{20}
\bibcite{15}{21}
\bibcite{9}{22}
