Spreading the Privacy Blanket: Differentially Oblivious Shuffling for Differential Privacy

被引:5
作者
Gordon, Dov [1 ]
Katz, Jonathan [2 ]
Liang, Mingyu [1 ]
Xu, Jiayu [1 ,3 ]
机构
[1] George Mason Univ, Fairfax, VA 22030 USA
[2] Univ Maryland, College Pk, MD 20742 USA
[3] Algorand, Boston, MA USA
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2022 | 2022年 / 13269卷
基金
美国国家科学基金会;
关键词
Differential privacy; Onion routing; ANONYMITY;
D O I
10.1007/978-3-031-09234-3_25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the shuffle model for differential privacy, n users locally randomize their data and submit the results to a trusted "shuffler" who mixes the results before sending them to a server for analysis. This is a promising model for real-world applications of differential privacy, as several recent results have shown that, in some cases, the shuffle model offers a strictly better privacy/utility tradeoff than what is possible in a purely local model. A downside of the shuffle model is its reliance on a trusted shuffler, and it is natural to try to replace this with a distributed shuffling protocol run by the users themselves. While it would of course be possible to use a fully secure shuffling protocol, one might hope to instead use a more-efficient protocol having weaker security guarantees. In this work, we consider a relaxation of secure shuffling called differential obliviousness that we prove suffices for differential privacy in the shuffle model. We also propose a differentially oblivious shuffling protocol based on onion routing that requires only O(n log n) communication while tolerating any constant fraction of corrupted users. We show that for practical settings of the parameters, our protocol outperforms existing solutions to the problem.
引用
收藏
页码:501 / 520
页数:20
相关论文
共 36 条
  • [1] Ando M., 2018, LIPICS, V107, DOI [10.4230/LIPIcs.ICALP.2018, DOI 10.4230/LIPICS.ICALP.2018]
  • [2] ANOA: A Framework For Analyzing Anonymous Communication Protocols Unified Definitions and Analyses of Anonymity Properties
    Backes, Michael
    Kate, Aniket
    Manoharan, Praveen
    Meiser, Sebastian
    Mohammadi, Esfandiar
    [J]. 2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2013, : 163 - 178
  • [3] Provably Secure and Practical Onion Routing
    Backes, Michael
    Goldberg, Ian
    Kate, Aniket
    Mohammadi, Esfandiar
    [J]. 2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 369 - 385
  • [4] The Privacy Blanket of the Shuffle Model
    Balle, Borja
    Bell, James
    Gascon, Adria
    Nissim, Kobbi
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 : 638 - 667
  • [5] Beimel A, 2008, LECT NOTES COMPUT SC, V5157, P451, DOI 10.1007/978-3-540-85174-5_25
  • [6] Secure Single-Server Aggregation with (Poly)Logarithmic Overhead
    Bell, James Henry
    Bonawitz, Kallista A.
    Gascon, Adria
    Lepoint, Tancrede
    Raykova, Mariana
    [J]. CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 1253 - 1269
  • [7] Bellet A., 2020, 34 INT S DISTRIBUTED, V179
  • [8] PROCHLO: Strong Privacy for Analytics in the Crowd
    Bittau, Andrea
    Erlingsson, Ulfar
    Maniatis, Petros
    Mironov, Ilya
    Raghunathan, Ananth
    Lie, David
    Rudominer, Mitch
    Kode, Ushasree
    Tinnes, Julien
    Seefeld, Bernhard
    [J]. PROCEEDINGS OF THE TWENTY-SIXTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES (SOSP '17), 2017, : 441 - 459
  • [9] Boyle E, 2013, LECT NOTES COMPUT SC, V7785, P356, DOI 10.1007/978-3-642-36594-2_21
  • [10] Bunz B., 2021, NONINTERACTIVE DIFFE