2014
DOI: 10.1145/2567671
|View full text |Cite
|
Sign up to set email alerts
|

The Hardness of Being Private

Abstract: Kushilevitz [1989] initiated the study of information-theoretic privacy within the context of communication complexity. Unfortunately, it has been shown that most interesting functions are not privately computable [Kushilevitz 1989, Brandt and Sandholm 2008]. The unattainability of perfect privacy for many functions motivated the study of approximate privacy . Feigenbaum et al. [2010a, 2010b] define notions of worst-case as well as average-case approximate privacy and present several in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…In the 1980s, the work of Ben-Or, Goldwasser and Wigderson [8] showed multiparty protocols in the message-passing model for computing any function in an information-theoretically private way, assuming that the corruption threshold t < k/2. 1 In addition, we know that information-theoretic perfect privacy is impossible to achieve if t ≥ k/2. That is, the adversary must learn some information about the honest players' inputs in this setting.…”
Section: Introductionmentioning
confidence: 99%
“…In the 1980s, the work of Ben-Or, Goldwasser and Wigderson [8] showed multiparty protocols in the message-passing model for computing any function in an information-theoretically private way, assuming that the corruption threshold t < k/2. 1 In addition, we know that information-theoretic perfect privacy is impossible to achieve if t ≥ k/2. That is, the adversary must learn some information about the honest players' inputs in this setting.…”
Section: Introductionmentioning
confidence: 99%
“…This situation is similar to [19], which studies a different model of private two-party computation, and where the best upper and lower bounds are also exponential and linear. In a similar spirit, [2] proves that in a communication model of approximate privacy called PAR (based on [43]), privacy can come at an exponential cost.…”
Section: Results For Zammentioning
confidence: 88%
“…Lower bounds for models (2) and (3) can be proved using known techniques. In case of (2) it is not difficult to show that lower bounds follow from the classic corruption bound, which is known to characterize the complexity class SBP [24].…”
Section: New Models Uam and Zammentioning
confidence: 99%
“…The "right" notion of computational privacy for use in ABE schemes is that of "doubly selective" security [3,34], where "doubly" refers to the two possibilities depending on whether x or y is chosen first. Unsurprisingly, proving 3 and using doubly selective security require substantially more 2 The easiest way to see this is via complexity leveraging: an adaptive distinguisher with advantage ε can be converted into a non-adaptive distinguisher with an exponential loss in ε via random guessing. Since any non-adaptive distinguisher has advantage 0, we must have ε = 0 to begin with.…”
Section: Implications For Dual System Abementioning
confidence: 99%
“…This question has been considered in several different models and settings [12,41,2,14]. In this work, we focus on a very simple and natural model where non-private computation requires very little communication (just a single bit), whereas the best upper bound for private computation is exponential.…”
Section: Introductionmentioning
confidence: 99%