Proceedings of the 27th ACM Symposium on Operating Systems Principles 2019
DOI: 10.1145/3341301.3359660
|View full text |Cite
|
Sign up to set email alerts
|

Honeycrisp

Abstract: Recently, a number of systems have been deployed that gather sensitive statistics from user devices while giving differential privacy guarantees. One prominent example is the component in Apple's macOS and iOS devices that collects information about emoji usage and new words. However, these systems have been criticized for making unrealistic assumptions, e.g., by creating a very high "privacy budget" for answering queries, and by replenishing this budget every day, which results in a high worst-case privacy lo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(4 citation statements)
references
References 54 publications
(62 reference statements)
0
4
0
Order By: Relevance
“…For secure aggregation protocols, authors typically do not report end-to-end wall-clock time resulting from an experimental evaluation, because it is not feasible to run such an experiment [3,5,15,17,22,23,29,30,33]. As we discuss later, the inability to measure concrete performance of these protocols makes it difficult to understand their relative performance properties.…”
Section: Overview Of Olympiamentioning
confidence: 99%
See 2 more Smart Citations
“…For secure aggregation protocols, authors typically do not report end-to-end wall-clock time resulting from an experimental evaluation, because it is not feasible to run such an experiment [3,5,15,17,22,23,29,30,33]. As we discuss later, the inability to measure concrete performance of these protocols makes it difficult to understand their relative performance properties.…”
Section: Overview Of Olympiamentioning
confidence: 99%
“…Several systems have been developed for differentially private analytics (i.e. database queries) that leverage ideas from secure aggregation, including Honeycrisp [22], Orchard [23], and Cryptε [25]. These systems are designed to scale to millions of participants, using specialized protocols and a slightly weaker threat model.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…That means no one, including the server or some trusted entities, should be able to make "very concrete" conclusions about the data, what the user owns. Analogously, when the communication involves secret key protocols, the most appropriate approach would be holding it at the clients, that is, to share among parties as it has been proposed by [176] and [181].…”
Section: Privacymentioning
confidence: 99%