Computational Differential Privacy Ilya Mironov (MICROSOFT) Omkant Pandey (UCLA) Omer Reingold (MICROSOFT) Salil Vadhan (HARVARD)

Slides:



Advertisements
Similar presentations
Dov Gordon & Jonathan Katz University of Maryland.
Advertisements

On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols Iftach Haitner, Alon Rosen and Ronen Shaltiel 1.
Efficiency vs. Assumptions in Secure Computation Yuval Ishai Technion & UCLA.
Computational Privacy. Overview Goal: Allow n-private computation of arbitrary funcs. –Impossible in information-theoretic setting Computational setting:
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
Many-to-one Trapdoor Functions and their Relations to Public-key Cryptosystems M. Bellare S. Halevi A. Saha S. Vadhan.
1 Efficient Pseudorandom Generators from Exponentially Hard One-Way Functions Iftach Haitner, Danny Harnik, Omer Reingold.
Computational Complexity & Differential Privacy Salil Vadhan Harvard University Joint works with Cynthia Dwork, Kunal Talwar, Andrew McGregor, Ilya Mironov,
Efficient Two-party and Multiparty Computation against Covert Adversaries Vipul Goyal Payman Mohassel Adam Smith Penn Sate UCLAUC Davis.
1 Vipul Goyal Abhishek Jain UCLA On the Round Complexity of Covert Computation.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
CIS 5371 Cryptography 3b. Pseudorandomness.
Amortizing Garbled Circuits Yan Huang, Jonathan Katz, Alex Malozemoff (UMD) Vlad Kolesnikov (Bell Labs) Ranjit Kumaresan (Technion) Cut-and-Choose Yao-Based.
Using Nondeterminism to Amplify Hardness Emanuele Viola Joint work with: Alex Healy and Salil Vadhan Harvard University.
Privacy Enhancing Technologies
Seminar in Foundations of Privacy 1.Adding Consistency to Differential Privacy 2.Attacks on Anonymized Social Networks Inbal Talgam March 2008.
Differential Privacy 18739A: Foundations of Security and Privacy Anupam Datta Fall 2009.
How Should We Solve Search Problems Privately? Kobbi Nissim – BGU A. Beimel, T. Malkin, and E. Weinreb.
Sets Definition of a Set: NAME = {list of elements or description of elements} i.e. B = {1,2,3} or C = {x  Z + | -4 < x < 4} Axiom of Extension: A set.
On the Complexity of Approximating the VC Dimension Chris Umans, Microsoft Research joint work with Elchanan Mossel, Microsoft Research June 2001.
Foundations of Cryptography Lecture 9 Lecturer: Moni Naor.
Foundations of Cryptography Rahul Jain CS6209, Jan – April 2011
1 Cross-Domain Secure Computation Chongwon Cho (HRL Laboratories) Sanjam Garg (IBM T.J. Watson) Rafail Ostrovsky (UCLA)
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Simulating independence: new constructions of Condensers, Ramsey Graphs, Dispersers and Extractors Boaz Barak Guy Kindler Ronen Shaltiel Benny Sudakov.
Strategy-Proof Classification Reshef Meir School of Computer Science and Engineering, Hebrew University A joint work with Ariel. D. Procaccia and Jeffrey.
How to play ANY mental game
The Complexity of Differential Privacy Salil Vadhan Harvard University TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
CS573 Data Privacy and Security Statistical Databases
Provable Unlinkability Against Traffic Analysis Amnon Ta-Shma Joint work with Ron Berman and Amos Fiat School of Computer Science, Tel-Aviv University.
Ragesh Jaiswal Indian Institute of Technology Delhi Threshold Direct Product Theorems: a survey.
m-Privacy for Collaborative Data Publishing
Secure Computation (Lecture 7-8) Arpita Patra. Recap >> (n,t)-Secret Sharing (Sharing/Reconstruction) > Shamir Sharing > Lagrange’s Interpolation for.
Slide 1 Vitaly Shmatikov CS 380S Introduction to Secure Multi-Party Computation.
Secure two-party computation: a visual way by Paolo D’Arco and Roberto De Prisco.
1 Privacy Preserving Data Mining Haiqin Yang Extracted from a ppt “Secure Multiparty Computation and Privacy” Added “Privacy Preserving SVM”
Secure Computation (Lecture 5) Arpita Patra. Recap >> Scope of MPC > models of computation > network models > modelling distrust (centralized/decentralized.
Cryptography Lecture 2 Arpita Patra. Summary of Last Class  Introduction  Secure Communication in Symmetric Key setting >> SKE is the required primitive.
Personalized Social Recommendations – Accurate or Private? A. Machanavajjhala (Yahoo!), with A. Korolova (Stanford), A. Das Sarma (Google) 1.
1 Information Security – Theory vs. Reality , Winter Lecture 10: Garbled circuits and obfuscation Eran Tromer Slides credit: Boaz.
Rational Cryptography Some Recent Results Jonathan Katz University of Maryland.
Some Fundamental Insights of Computational Complexity Theory Avi Wigderson IAS, Princeton, NJ Hebrew University, Jerusalem.
Foundations of Privacy Lecture 5 Lecturer: Moni Naor.
Secure Computation Lecture Arpita Patra. Recap > Shamir Secret-sharing > BGW Protocol based on secret-sharing > Offline/Online phase > Creating.
Differential Privacy Xintao Wu Oct 31, Sanitization approaches Input perturbation –Add noise to data –Generalize data Summary statistics –Means,
Pseudo-random generators Talk for Amnon ’ s seminar.
1 Differential Privacy Cynthia Dwork Mamadou H. Diallo.
Error-Correcting Codes and Pseudorandom Projections Luca Trevisan U.C. Berkeley.
Cryptography Lecture 3 Arpita Patra © Arpita Patra.
Multi-Party Computation r n parties: P 1,…,P n  P i has input s i  Parties want to compute f(s 1,…,s n ) together  P i doesn’t want any information.
Topic 36: Zero-Knowledge Proofs
Private Data Management with Verification
Foundations of Secure Computation
Privacy-preserving Release of Statistics: Differential Privacy
Modern symmetric-key Encryption
Course Business I am traveling April 25-May 3rd
CAE: A Collusion Attack against Privacy-preserving Data Aggregation Schemes Wei Yang University of Science and Technology of China (USTC) Contact Me.
CS 154, Lecture 6: Communication Complexity
Cryptography Lecture 5.
Current Developments in Differential Privacy
CMSC 414 Computer and Network Security Lecture 3
Linear sketching with parities
When are Fuzzy Extractors Possible?
When are Fuzzy Extractors Possible?
Computational Two Party Correlation
Imperfectly Shared Randomness
Cryptography Lecture 5.
The Zig-Zag Product and Expansion Close to the Degree
Impossibility of SNARGs
Gentle Measurement of Quantum States and Differential Privacy *
Presentation transcript:

Computational Differential Privacy Ilya Mironov (MICROSOFT) Omkant Pandey (UCLA) Omer Reingold (MICROSOFT) Salil Vadhan (HARVARD)

Focus of the Talk Relaxations of differential privacy for computational adversaries How they relate to one another and other existing notions Natural protocols demonstrating their benefits

Motivation Achieve better utility Standard MPC does not prevent what is leaked by the output – Can we combine computational MPC protocols with DP -functions [DKMMN’06,BNO’08]? Nontrivial differentially private mechanisms must be randomized – Applications typically use pseudorandom sources. What are the formal privacy guarantees achieved?

Differential Privacy [ Dwork’06 ] Mechanism K provides privacy to an individual, if individual’s data effects the output of K only “little” K: D  R ensures ε- DP if for all adjacent datasets D 1, D 2 and for all subsets S of R : “adjacent” means “differ in one individual’s entry”

Pictorial Representation — bad outcome — probability with record x — probability without record x

Towards Computational Notions Equivalently,

First Definition: IND-CDP ε- IND-CDP : Mechanism K is ε- IND-CDP if for all adjacent D 1, D 2, for all polynomial sized circuits A, and for all large enough λ, it holds that, Necessary

Simulation-based Approach D : X M(D) Y K(D) Differentially Private M

Second Definition: SIM-CDP ε- SIM-CDP : Mechanism K is ε- SIM-CDP if there exists an ε-differentially-private mechanism M such that for all D, distributions M(D) and K(D) are computationally indistinguishable. – M is not necessarily a PPT mechanism – Reversing the order of quantifiers yields another definition, SIM  -CDP :

Immediate Questions Are these definitions equivalent? Not hard to see that Main question: SIM-CDP IND-CDP IND-CDP SIM-CDP?

Connection with Dense Models [RTTV’08, Imp’08] Distribution X is α-dense in Y if for all tests T, X is α-pseudodense in Y if for all PPT tests T, [RTTV’08] : Reingold, O., Trevisan, L., Tulsiani, M., Vadhan, S. “Dense subsets of Pseudorandom Sets”, FOCS 2008.

Connection with Dense Models [RTTV’08, Imp’08] Differential Privacy: – – In the language of dense models – K(D 1 ) is e ε -dense in K(D 2 ) – K(D 2 ) is e ε -dense in K(D 1 ) ε- DP : K(D 1 ) and K(D 2 ) are mutually e ε -dense

Connection with Dense Models [RTTV ’08, Imp’08] ε- IND-CDP : – – In the language of dense models – K(D 1 ) is e ε -pseudodense in K(D 2 ) – K(D 2 ) is e ε -pseudodense in K(D 1 ) ε- IND-CDP : K(D 1 ) and K(D 2 ) are mutually e ε -pseudodense

Some Notation X Y ( X is pseudodense in Y ) X Y ( X,Y are mutually pseudodense ) X Y ( X is dense in Y ) X Y ( X,Y are mutually dense) ( X,Y comp. indistinguishable) X Y

The Dense Model Theorem [RTTV’08] X1X1 X2X2 Y Thm : If X 1 is pseudodense in X 2, there exists a model Y (truly) dense in X 2 such that X 1 is computationally indistinguishable from Y.

X1X1 X2X2 X 1 =K(D 1 ) X 2 =K(D 2 ) (IND-CDP) Y1Y1 Y2Y2 Y 1 =M(D 1 ) Y 2 =M(D 2 ) X1X1 X2X2 Z1Z1 Z2Z2 ? Proof Ideas Extension of DM T X Y: X dense in Y, X Y: X,Y mutually dense X Y: X pseudo-dense in Y, X Y: X,Y mutually pseudo-dense (SIM -CDP) Z2Z2

To Recap We prove an extension of “The Dense Model Theorem” of [ RTTV’08 ]. Sufficient to establish: Still OPEN: IND-CDP SIM-CDP ? IND-CDP  SIM  -CDP

Benefits: Better Utility CDP : Easily get  (1/ε) error w/ constant probability. AliceBob x1x2…xnx1x2…xn y1y2…yny1y2…yn H(x,y) Protocol: Trusted Party: H(x,y)+Lap(1/ε) SFE DP : Requires Ω(n ½ ) error ! [Reingold-Vadhan] ~

Other Results A new protocol for Hamming Distance: – Differentially private (standard) – Constant multiplicative error Differentially Private Two-Party Computation

Thank you for your attention!