2019
DOI: 10.1007/978-3-030-17653-2_13
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Differential Privacy via Shuffling

Abstract: We consider the problem of designing scalable, robust protocols for computing statistics about sensitive data. Specifically, we look at how best to design differentially private protocols in a distributed setting, where each user holds a private datum. The literature has mostly considered two models: the "central" model, in which a trusted server collects users' data in the clear, which allows greater accuracy; and the "local" model, in which users individually randomize their data, and need not trust the serv… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

8
262
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 221 publications
(280 citation statements)
references
References 31 publications
(77 reference statements)
8
262
0
Order By: Relevance
“…We prove our lower bound for sequentially interactive (ε, 0)-locally private protocols. As previous work [9,12] has established that (ε, 0)-and (ε, δ)-local privacy are approximately equivalent for reasonable parameter ranges, our lower bound also holds for sequentially interactive (ε, δ)-locally private protocols. For an extended discussion of this equivalence, see Section 5.1.2.…”
Section: A Lower Bound For Sequentially Interactive Mechanismssupporting
confidence: 70%
See 1 more Smart Citation
“…We prove our lower bound for sequentially interactive (ε, 0)-locally private protocols. As previous work [9,12] has established that (ε, 0)-and (ε, δ)-local privacy are approximately equivalent for reasonable parameter ranges, our lower bound also holds for sequentially interactive (ε, δ)-locally private protocols. For an extended discussion of this equivalence, see Section 5.1.2.…”
Section: A Lower Bound For Sequentially Interactive Mechanismssupporting
confidence: 70%
“…We now show that the folklore ε-private non-interactive test is optimal amongst all (ε, δ)-private fully interactive tests. First, combining (slightly modified versions of) Theorem 6.1 from Bun et al [9] and Theorem A.1 in Cheu et al [12], we get the following result 5 for j = 0, 1 do…”
Section: A Lower Bound For Arbitrarily Adaptive (ε δ)-Locally Privatmentioning
confidence: 86%
“…Together with our upper bound, this result shows that the single-message shuffle model sits strictly between the curator and the local models of differential privacy. This had been shown by Cheu et al [11] in a less direct way by showing that (i) the private selection problem can be solved more accurately in the curator model than the shuffle model, and (ii) the private summation problem can be solved more accurately in the shuffle model than in the local model. For (i) they rely on a generic translation from the shuffle to the local model and known lower bounds for private selection in the local model, while our lower bound operates directly in the shuffle model.…”
Section: A Lower Bound For Private Summationmentioning
confidence: 99%
“…To see the benefit of creating a privacy blanket, consider the recent shuffle model summation protocol by Cheu et al [11]. This protocol also applies randomized rounding.…”
Section: A Protocol For Private Summationmentioning
confidence: 99%
“…Finally, for simplicity we state all of our results for pure ε-local privacy. However, for reasonable values of δ (roughly δ = o ε n log(n) ) they easily extend to (ε, δ)-local privacy using the approximateto-pure transformation described by Bun et al [9] and Cheu et al [10].…”
Section: Our Contributionsmentioning
confidence: 99%