2018
DOI: 10.1007/978-3-319-76620-1_8
|View full text |Cite
|
Sign up to set email alerts
|

Computational Differential Privacy from Lattice-Based Cryptography

Abstract: The emerging technologies for large scale data analysis raise new challenges to the security and privacy of sensitive user data. In this work we investigate the problem of private statistical analysis of time-series data in the distributed and semi-honest setting. In particular, we study some properties of Private Stream Aggregation (PSA), first introduced by Shi et al. 2011. This is a computationally secure protocol for the collection and aggregation of data in a distributed network and has a very small commu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 42 publications
(112 reference statements)
0
7
0
Order By: Relevance
“…The combination of SecAgg and distributed DP in the context of federated analytics is far less studied. Indeed, the majority of existing works ignore the scalability, finite precision, and modular arithmetic challenges associated with SecAgg [36,51,53]. This is especially constraining at low SecAgg bit-widths (e.g., in settings where communication efficiency and scalability are critical).…”
Section: Distributed Dp With Secaggmentioning
confidence: 99%
“…The combination of SecAgg and distributed DP in the context of federated analytics is far less studied. Indeed, the majority of existing works ignore the scalability, finite precision, and modular arithmetic challenges associated with SecAgg [36,51,53]. This is especially constraining at low SecAgg bit-widths (e.g., in settings where communication efficiency and scalability are critical).…”
Section: Distributed Dp With Secaggmentioning
confidence: 99%
“…The Skellam mechanism was first introduced in [49] for the scalar case. As our goal is to apply the Skellam mechanism in the learning context, we have to address the following challenges.…”
Section: The Skellam Mechanismmentioning
confidence: 99%
“…(1) Tight privacy compositions: Learning algorithms are iterative in nature and require the application of the DP mechanism many times (often > 1000). The current direct approximate DP analysis in [49] can be combined with advanced composition (AC) theorems [28,22] but that leads to poor privacy-accuracy trade-offs (see Fig. 1).…”
Section: The Skellam Mechanismmentioning
confidence: 99%
See 2 more Smart Citations