4 research outputs found

    Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation

    Get PDF
    Consider a PPT two-party protocol Π=(A,B)\Pi=(A,B) in which the parties get no private inputs and obtain outputs OA,OB{0,1}O^A,O^B\in \{0,1\}, and let VAV^A and VBV^B denote the parties\u27 individual views. Protocol Π\Pi has α\alpha-agreement if Pr[OA=OB]=1/2+αPr[O^A=O^B]=1/2+\alpha. The leakage of ϵ\epsilon is the amount of information a party obtains about the event {OA=OB}\{O^A=O^B\}; that is, the leakage ϵ\epsilon is the maximum, over P{A,B}P\in \{A,B\}, of the distance between VPOA=OBV^P|_{O^A=O^B} and VPOAOBV^P|_{O^A\neq O^B}. Typically, this distance is measured in statistical distance, or, in the computational setting, in computational indistinguishability. For this choice, Wullschleger [TCC \u2709] showed that if ϵ<<α\epsilon<<\alpha then the protocol can be transformed into an OT protocol. We consider measuring the protocol leakage by the log-ratio distance (which was popularized by its use in the differential privacy framework). The log-ratio distance between X,YX,Y over domain Ω\Omega is the minimal ϵ0\epsilon\geq 0 for which, for every vΩ,log(Pr[X=v]/Pr[Y=v])[ϵ,ϵ]v\in\Omega, \log(Pr[X=v]/Pr[Y=v])\in [-\epsilon,\epsilon]. In the computational setting, we use computational indistinguishability from having log-ratio distance ϵ\epsilon. We show that a protocol with (noticeable) accuracy αΩ(ϵ2)\alpha\in\Omega(\epsilon^2) can be transformed into an OT protocol (note that this allows ϵ>>α\epsilon>>\alpha). We complete the picture, in this respect, showing that a protocol with αo(ϵ2)\alpha\in o(\epsilon^2) does not necessarily imply OT. Our results hold for both the information theoretic and the computational settings, and can be viewed as a ``fine grained\u27\u27 approach to ``weak OT amplification\u27\u27. We then use the above result to fully characterize the complexity of differentially private two-party computation for the XOR function, answering the open question put by Goyal, Khurana, Mironov, Pandey, and Sahai [ICALP \u2716] and Haitner, Nissim, Omri, Shaltiel, and Silbak [FOCS \u2718]. Specifically, we show that for any (noticeable) αΩ(ϵ2)\alpha\in\Omega(\epsilon^2), a two-party protocol that computes the XOR function with α\alpha-accuracy and ϵ\epsilon-differential privacy can be transformed into an OT protocol. This improves upon Goyal et al. that only handle αΩ(ϵ)\alpha\in\Omega(\epsilon), and upon Haitner et al. who showed that such a protocol implies (infinitely-often) key agreement (and not OT). Our characterization is tight since OT does not follow from protocols in which αo(ϵ2)\alpha\in o(\epsilon^2), and extends to functions (over many bits) that ``contain\u27\u27 an ``embedded copy\u27\u27 of the XOR function

    Separating Key Agreement and Computational Differential Privacy

    Full text link
    Two party differential privacy allows two parties who do not trust each other, to come together and perform a joint analysis on their data whilst maintaining individual-level privacy. We show that any efficient, computationally differentially private protocol that has black-box access to key agreement (and nothing stronger), is also an efficient, information-theoretically differentially private protocol. In other words, the existence of efficient key agreement protocols is insufficient for efficient, computationally differentially private protocols. In doing so, we make progress in answering an open question posed by Vadhan about the minimal computational assumption needed for computational differential privacy. Combined with the information-theoretic lower bound due to McGregor, Mironov, Pitassi, Reingold, Talwar, and Vadhan in [FOCS'10], we show that there is no fully black-box reduction from efficient, computationally differentially private protocols for computing the Hamming distance (or equivalently inner product over the integers) on nn bits, with additive error lower than O(neϵlog(n))O\left(\frac{\sqrt{n}}{e^{\epsilon}\log(n)}\right), to key agreement. This complements the result by Haitner, Mazor, Silbak, and Tsfadia in [STOC'22], which showed that computing the Hamming distance implies key agreement. We conclude that key agreement is \emph{strictly} weaker than computational differential privacy for computing the inner product, thereby answering their open question on whether key agreement is sufficient

    SoK: Differential Privacies

    Get PDF
    Shortly after it was first introduced in 2006, differential privacy became the flagship data privacy definition. Since then, numerous variants and extensions were proposed to adapt it to different scenarios and attacker models. In this work, we propose a systematic taxonomy of these variants and extensions. We list all data privacy definitions based on differential privacy, and partition them into seven categories, depending on which aspect of the original definition is modified. These categories act like dimensions: variants from the same category cannot be combined, but variants from different categories can be combined to form new definitions. We also establish a partial ordering of relative strength between these notions by summarizing existing results. Furthermore, we list which of these definitions satisfy some desirable properties, like composition, post-processing, and convexity by either providing a novel proof or collecting existing ones.Comment: This is the full version of the SoK paper with the same title, accepted at PETS (Privacy Enhancing Technologies Symposium) 202

    SoK: Differential privacies

    Get PDF
    Shortly after it was first introduced in 2006, differential privacy became the flagship data privacy definition. Since then, numerous variants and extensions were proposed to adapt it to different scenarios and attacker models. In this work, we propose a systematic taxonomy of these variants and extensions. We list all data privacy definitions based on differential privacy, and partition them into seven categories, depending on which aspect of the original definition is modified
    corecore