Amplification by Shuffling without Shuffling

05/18/2023
by   Borja Balle, et al.
0

Motivated by recent developments in the shuffle model of differential privacy, we propose a new approximate shuffling functionality called Alternating Shuffle, and provide a protocol implementing alternating shuffling in a single-server threat model where the adversary observes all communication. Unlike previous shuffling protocols in this threat model, the per-client communication of our protocol only grows sub-linearly in the number of clients. Moreover, we study the concrete efficiency of our protocol and show it can improve per-client communication by one or more orders of magnitude with respect to previous (approximate) shuffling protocols. We also show a differential privacy amplification result for alternating shuffling analogous to the one for uniform shuffling, and demonstrate that shuffling-based protocols for secure summation based a construction of Ishai et al. (FOCS'06) remain secure under the Alternating Shuffle. In the process we also develop a protocol for exact shuffling in single-server threat model with amortized logarithmic communication per-client which might be of independent interest.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/07/2019

The Privacy Blanket of the Shuffle Model

This work studies differential privacy in the context of the recently pr...
research
12/19/2021

Pure Differential Privacy from Secure Intermediaries

Recent work in differential privacy has explored the prospect of combini...
research
06/19/2019

Scalable and Differentially Private Distributed Aggregation in the Shuffled Model

Federated learning promises to make machine learning feasible on distrib...
research
04/14/2021

Preventing Manipulation Attack in Local Differential Privacy using Verifiable Randomization Mechanism

Local differential privacy (LDP) has been received increasing attention ...
research
02/22/2022

Differential Secrecy for Distributed Data and Applications to Robust Differentially Secure Vector Summation

Computing the noisy sum of real-valued vectors is an important primitive...
research
06/14/2022

Private Set Matching Protocols

We introduce Private Set Matching (PSM) problems, in which a client aims...
research
08/04/2022

A Forward-secure Efficient Two-factor Authentication Protocol

Two-factor authentication (2FA) schemes that rely on a combination of kn...

Please sign up or login with your details

Forgot password? Click here to reset