Local, Private, Efficient Protocols for Succinct Histograms

被引:275
|
作者
Bassily, Raef [1 ]
Smith, Adam [1 ]
机构
[1] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
基金
美国国家科学基金会;
关键词
NOISE;
D O I
10.1145/2746539.2746632
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We give efficient protocols and matching accuracy lower bounds for frequency estimation in the local model for differential privacy. In this model, individual users randomize their data themselves, sending differentially private reports to an untrusted server that aggregates them. We study protocols that produce a succinct histogram representation of the data. A succinct histogram is a list of the most frequent items in the data (often called "heavy hitters") along with estimates of their frequencies; the frequency of all other items is implicitly estimated as 0. If there are n users whose items come from a universe of size d, our protocols run in time polynomial in n and log(d). With high probability, they estimate the accuracy of every item up to error O(root log(d)/(epsilon(2)n)). Moreover, we show that this much error is necessary, regardless of computational efficiency, and even for the simple setting where only one item appears with significant frequency in the data set. Previous protocols (Mishra and Sandler, 2006; Hsu, Khanna and Roth, 2012) for this task either ran in time Omega(d) or had much worse error (about 6 root log(d)/(epsilon(2)n)), and the only known lower bound on error was Omega(1/root n). We also adapt a result of McGregor et al (2010) to the local setting. In a model with public coins, we show that each user need only send 1 hit to the server. For all known local protocols (including ours), the transformation preserves computational efficiency.
引用
收藏
页码:127 / 135
页数:9
相关论文
共 50 条
  • [1] Efficient Private Statistics with Succinct Sketches
    Melts, Luca
    Danezis, George
    De Cristofaro, Emiliano
    23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
  • [2] Efficient Protocols for Private Database Queries
    Saha, Tushar Kanti
    Mayank
    Koshiba, Takeshi
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXI, DBSEC 2017, 2017, 10359 : 337 - 348
  • [3] Efficient Protocols for Collecting Histograms in Large-Scale RFID Systems
    Xie, Lei
    Han, Hao
    Li, Qun
    Wu, Jie
    Lu, Sanglu
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (09) : 2421 - 2433
  • [4] Efficient Private PEZ Protocols for Symmetric Functions
    Abe, Yoshiki
    Iwamoto, Mitsugu
    Ohta, Kazuo
    THEORY OF CRYPTOGRAPHY, TCC 2019, PT I, 2019, 11891 : 372 - 392
  • [5] Efficient protocols for private wildcards pattern matching
    Saha, Tushar Kanti
    Rathee, Deevashwer
    Koshiba, Takeshi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
  • [6] Succinct Population Protocols for Presburger Arithmetic
    Blondin, Michael
    Esparza, Javier
    Genest, Blaise
    Helfrich, Martin
    Jaax, Stefan
    37TH INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE (STACS 2020), 2020, 154
  • [7] Efficient and Location-Private Communication Protocols for WBSNs
    Braeken, An
    Singelee, Dave
    AD HOC & SENSOR WIRELESS NETWORKS, 2013, 19 (3-4) : 305 - 326
  • [8] Efficient Implementation of Private License Plate Matching Protocols
    Vaishnav, Harshul
    Sharma, Smriti
    Mathuria, Anish
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2017, 2017, 10662 : 281 - 294
  • [9] Fast and succinct population protocols for Presburger arithmetic
    Czerner, Philipp
    Guttenberg, Roland
    Helfrich, Martin
    Esparza, Javier
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2024, 140
  • [10] Differentially private anonymized histograms
    Suresh, Ananda Theertha
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 32 (NIPS 2019), 2019, 32