Proceedings 2016 Network and Distributed System Security Symposium 2016
DOI: 10.14722/ndss.2016.23175
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Private Statistics with Succinct Sketches

Abstract: Abstract-Large-scale collection of contextual information is often essential in order to gather statistics, train machine learning models, and extract knowledge from data. The ability to do so in a privacy-preserving way -i.e., without collecting finegrained user data -enables a number of additional computational scenarios that would be hard, or outright impossible, to realize without strong privacy guarantees. In this paper, we present the design and implementation of practical techniques for privately gather… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
81
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 66 publications
(82 citation statements)
references
References 49 publications
0
81
0
Order By: Relevance
“…In order to execute queries and compute statistics on distributed datasets, multiple decentralized solutions [10], [12], [14], [22], [23], [24], [25] rely on techniques that have a high expressive power, such as secret sharing and garbled circuits. These solutions are often flexible in the computations they offer but usually assume (a) honest-but-curious computing parties and (b) no collusion or a 2-party model.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to execute queries and compute statistics on distributed datasets, multiple decentralized solutions [10], [12], [14], [22], [23], [24], [25] rely on techniques that have a high expressive power, such as secret sharing and garbled circuits. These solutions are often flexible in the computations they offer but usually assume (a) honest-but-curious computing parties and (b) no collusion or a 2-party model.…”
Section: Related Workmentioning
confidence: 99%
“…In this context, decentralized data-sharing systems [10], [11], [12], [13], [14], [15] have raised considerable interest and are key enablers for privacy-conscious big-data analysis. By distributing the storage and the computation, thus avoiding single points of failure, these systems enable data sharing and minimize the risks incurred by centralized solutions.…”
Section: Introductionmentioning
confidence: 99%
“…Tschorsch and Scheuermann [41] proposed a noiseadding mechanism for use in such a distributed context. In [32], each party encrypts their sketch, and sends it encrypted to a tally process, which aggregates them using homomorphic encryption. Ashok et al [5] propose a multiparty computation protocol based on Bloom filters to estimate cardinality without the need for homomorphic encryption, while Egert et al [20] show that Ashok et al's approach is vulnerable to attacks and propose a more secure variant of the protocol.…”
Section: Previous Workmentioning
confidence: 99%
“…There are two main privacy-enhancing strategies to collect location data and compute aggregate time-series. (1) Cryptographic protocols for private aggregation can let a server obtain aggregates without learning users' individual records [36,37,31], but make no consideration about the privacy loss from learning and/or releasing exact statistics. We have evaluated this scenario in Section 4.…”
Section: Related Workmentioning
confidence: 99%