Secure Multi-party Computation of Differentially Private Heavy Hitters

被引:14
|
作者
Boehler, Jonas [1 ]
Kerschbaum, Florian [2 ]
机构
[1] SAP Secur Res, Karlsruhe, Germany
[2] Univ Waterloo, Waterloo, ON, Canada
关键词
Heavy Hitters; Differential Privacy; Secure Multi-party Computation; Sketches; NOISE;
D O I
10.1145/3460120.3484557
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Private learning of top-k, i.e., the k most frequent values also called heavy hitters, is a common industry scenario: Companies want to privately learn, e.g., frequently typed new words to improve suggestions on mobile devices, often used browser settings, telemetry data of frequent crashes, heavily shared articles, etc. Real-world deployments often use local differential privacy, where distributed users share locally randomized data with an untrusted server. Central differential privacy, on the other hand, assumes access to the raw data and applies the randomization only once, on the aggregated result. These solutions either require large amounts of users for high accuracy (local model) or a trusted third party (central model). We present multi-party computation protocols HH and PEM of sketches (succinct data structures) to efficiently compute differentially private top-k: HH has running time linear in the size of the data and is applicable for very small data sets (hundreds of values), and PEM is sublinear in the data domain and provides better accuracy than HH for large data sizes. Our approaches are efficient (practical running time, requiring no output reconstruction as other sketches) and more accurate than local differential privacy even for a small number of users. In our experiments, we were able to securely compute differentially private top-k in less than 11 minutes using 3 semi-honest computation parties distributed over the Internet with inputs from hundreds of users (HH) and input size that is independent of the user count (PEM, excluding count aggregation).
引用
收藏
页码:2361 / 2377
页数:17
相关论文
共 50 条
  • [1] Secure Multi-party Computation of Differentially Private Median
    Bohler, Jonas
    Kerschbaum, Florian
    PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 2147 - 2164
  • [2] Differentially Private Multi-party Computation
    Kairouz, Peter
    Oh, Sewoong
    Viswanath, Pramod
    2016 ANNUAL CONFERENCE ON INFORMATION SCIENCE AND SYSTEMS (CISS), 2016,
  • [3] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [4] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    NETWORKING 2012, PT II, 2012, 7290 : 198 - 210
  • [5] From Input Private to Universally Composable Secure Multi-party Computation Primitives
    Bogdanov, Dan
    Laud, Peeter
    Laur, Sven
    Pullonen, Pille
    2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2014, : 184 - 198
  • [6] Private outsourced model predictive control via secure multi-party computation
    Adelipour, Saeed
    Haeri, Mohammad
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 116
  • [7] A Decentralized Private Data Marketplace using Blockchain and Secure Multi-Party Computation
    Bernabe-Rodriguez, Julen
    Garreta, Albert
    Lage, Oscar
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2024, 27 (02)
  • [8] Secure Multi-Party Computation in Differential Private Data with Data Integrity Protection
    Sundari, S.
    Ananthi, M.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATIONS TECHNOLOGIES (ICCCT 15), 2015, : 180 - 184
  • [9] Information theory and secure multi-party computation
    Maurer, UM
    1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 152 - 153
  • [10] Secure multi-party computation without agreement
    Goldwasser, S
    Lindell, Y
    JOURNAL OF CRYPTOLOGY, 2005, 18 (03) : 247 - 287