“…For the rest of this paper, we present algorithms as if the data were held centrally, with the understanding that all the operations we use can be performed in the federated model (with rounding to fixed precision) 2 . This means that we avoid techniques designed for central evaluation such as the exponential mechanism [33,45,65]. Threat Model: In this work, in common with many other works in the federated setting, we assume an honest-but-curious model, where the clients do not trust others with their raw data.…”