Verified Computational Differential Privacy with Applications to Smart Metering

被引:50
作者
Barthe, Gilles [1 ]
Danezis, George [3 ]
Gregoire, Benjamin [2 ]
Kunz, Cesar [1 ]
Zanella-Beguelin, Santiago [3 ]
机构
[1] IMDEA Software Inst, Madrid, Spain
[2] INRIA, Sophia Antipolis, France
[3] Microsoft Res, Cambridge, England
来源
2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF) | 2013年
关键词
D O I
10.1109/CSF.2013.26
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
EasyCrypt is a tool-assisted framework for reasoning about probabilistic computations in the presence of adversarial code, whose main application has been the verification of security properties of cryptographic constructions in the computational model. We report on a significantly enhanced version of EasyCrypt that accommodates a richer, user-extensible language of probabilistic expressions and, more fundamentally, supports reasoning about approximate forms of program equivalence. This enhanced framework allows us to express a broader range of security properties, that notably include approximate and computational differential privacy. We illustrate the use of the framework by verifying two protocols: a two-party protocol for computing the Hamming distance between bit-vectors, yielding two-sided privacy guarantees; and a novel, efficient, and privacy-friendly distributed protocol to aggregate smart meter readings into statistics and bills.
引用
收藏
页码:287 / 301
页数:15
相关论文
共 46 条
[21]  
Dodis Y, 2012, LECT NOTES COMPUT SC, V7417, P497
[22]  
Dwork C, 2004, LECT NOTES COMPUT SC, V3152, P528
[23]  
Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
[24]   Linear Dependent Types for Differential Privacy [J].
Gaboardi, Marco ;
Haeberlen, Andreas ;
Hsu, Justin ;
Narayan, Arjun ;
Pierce, Benjamin C. .
ACM SIGPLAN NOTICES, 2013, 48 (01) :357-370
[25]  
Garcia FD, 2011, LECT NOTES COMPUT SC, V6710, P226, DOI 10.1007/978-3-642-22444-7_15
[26]   UNIVERSALLY UTILITY-MAXIMIZING PRIVACY MECHANISMS [J].
Ghosh, Arpita ;
Roughgarden, Tim ;
Sundararajan, Mukund .
SIAM JOURNAL ON COMPUTING, 2012, 41 (06) :1673-1693
[27]  
Goethals B, 2004, LECT NOTES COMPUT SC, V3506, P104
[28]  
Groce A, 2011, LECT NOTES COMPUT SC, V6597, P417, DOI 10.1007/978-3-642-19571-6_25
[29]  
Gupta A, 2010, PROC APPL MATH, V135, P1106
[30]  
Hurd J., 2002, Automated Deduction - CADE-18. 18th International Conference on Automated Deduction. Proceedings (Lecture Notes in Artificial Intelligence Vol.2392), P134