DP-Cryptography: Marrying Differential Privacy and Cryptography in Emerging Applications

04/19/2020
by   Sameer Wagh, et al.
0

Differential privacy (DP) has arisen as the state-of-the-art metric for quantifying individual privacy when sensitive data are analyzed, and it is starting to see practical deployment in organizations such as the US Census Bureau, Apple, Google, etc. There are two popular models for deploying differential privacy - standard differential privacy (SDP), where a trusted server aggregates all the data and runs the DP mechanisms, and local differential privacy (LDP), where each user perturbs their own data and perturbed data is analyzed. Due to security concerns arising from aggregating raw data at a single server, several real world deployments in industry have embraced the LDP model. However, systems based on the LDP model tend to have poor utility - "a gap" in the utility achieved as compared to systems based on the SDP model. In this work, we survey and synthesize emerging directions of research at the intersection of differential privacy and cryptography. First, we survey solutions that combine cryptographic primitives like secure computation and anonymous communication with differential privacy to give alternatives to the LDP model that avoid a trusted server as in SDP but close the gap in accuracy. These primitives introduce performance bottlenecks and necessitate efficient alternatives. Second, we synthesize work in an area we call "DP-Cryptography" - cryptographic primitives that are allowed to leak differentially private outputs. These primitives have orders of magnitude better performance than standard cryptographic primitives. DP-cryptographic primitives are perfectly suited for implementing alternatives to LDP, but are also applicable to scenarios where standard cryptographic primitives do not have practical implementations. Through this unique lens of research taxonomy, we survey ongoing research in these directions while also providing novel directions for future research.

READ FULL TEXT
research
02/20/2019

Outis: Crypto-Assisted Differential Privacy on Untrusted Servers

Differential privacy has steadily become the de-facto standard for achie...
research
04/06/2023

When approximate design for fast homomorphic computation provides differential privacy guarantees

While machine learning has become pervasive in as diversified fields as ...
research
11/02/2020

the Connection between Cryptography and Differential Privacy: a Survey

Due to the successful application of data analysis technology in many fi...
research
11/19/2022

A Survey on Differential Privacy with Machine Learning and Future Outlook

Nowadays, machine learning models and applications have become increasin...
research
01/06/2020

ARA : Aggregated RAPPOR and Analysis for Centralized Differential Privacy

Differential privacy(DP) has now become a standard in case of sensitive ...
research
08/09/2020

Local Differential Privacy and Its Applications: A Comprehensive Survey

With the fast development of Information Technology, a tremendous amount...
research
09/06/2022

A Crypto-Assisted Approach for Publishing Graph Statistics with Node Local Differential Privacy

Publishing graph statistics under node differential privacy has attracte...

Please sign up or login with your details

Forgot password? Click here to reset