Nothing Special   »   [go: up one dir, main page]

What a lovely hat

Is it made out of tin foil?

Paper 2024/004

Practical Two-party Computational Differential Privacy with Active Security

Fredrik Meisingseth, Graz University of Technology
Christian Rechberger, Graz University of Technology
Fabian Schmid, Graz University of Technology
Abstract

In this work we revisit the problem of using general-purpose MPC schemes to emulate the trusted dataholder in differential privacy (DP), to achieve the same accuracy but without the need to trust one single dataholder. In particular, we consider the two-party model where two computational parties (or dataholders), each with their own dataset, wish to compute a canonical DP mechanism on their combined data and to do so with active security. We start by remarking that available definitions of computational DP (CDP) for protocols are somewhat ill-suited for such a use-case, due to them either poorly capturing some strong security guarantees commonly given by general-purpose MPC protocols, or having too strict requirements in the sense that they need significant adjustment in order to be satisfiable by using common DP and MPC techniques. With this in mind, we propose a new version of simulation-based CDP, called SIM$^*$-CDP, and prove it to be stronger than the IND-CDP and SIM-CDP and incomparable to SIM$^+$-CDP. We demonstrate the usability of the SIM$^*$-CDP definition by showing how to satisfy it by the use of an available distributed protocol for sampling truncated geometric noise. Further, we use the protocol to compute two-party inner-products with CDP and active security, and with accuracy equal to that of the central model, being the first to do so. Finally, we provide an open-sourced implementation and benchmark its practical performance. Our implementation generates a truncated geometric sample in between about 0.035 and 3.5 seconds (amortized), depending on network and parameter settings, comparing favourably to existing implementations.

Note: Major rewrite of first versions after having received review feedback. In particular, we reformulate the main definitions slightly and provide formal results on how they related to previous definitions. We also extend the background section and appendix significantly to increase the clarity of the work and make the paper easier to read for a wider audience. Additional changes: Corrected a notational error regarding the computational domains.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Minor revision. PoPETS 2025, to appear
Keywords
Differential PrivacyMultiparty computationUC-security
Contact author(s)
Fredrik meisingseth @ iaik tugraz at
Christian rechberger @ iaik tugraz at
Fabian schmid @ iaik tugraz at
History
2024-09-19: last of 4 revisions
2024-01-02: received
See all versions
Short URL
https://ia.cr/2024/004
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/004,
      author = {Fredrik Meisingseth and Christian Rechberger and Fabian Schmid},
      title = {Practical Two-party Computational Differential Privacy with Active Security},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/004},
      year = {2024},
      url = {https://eprint.iacr.org/2024/004}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.