On InstaHide, Phase Retrieval, and Sparse Matrix Factorization

11/23/2020
by   Sitan Chen, et al.
0

In this work, we examine the security of InstaHide, a scheme recently proposed by [Huang, Song, Li and Arora, ICML'20] for preserving the security of private datasets in the context of distributed learning. To generate a synthetic training example to be shared among the distributed learners, InstaHide takes a convex combination of private feature vectors and randomly flips the sign of each entry of the resulting vector with probability 1/2. A salient question is whether this scheme is secure in any provable sense, perhaps under a plausible hardness assumption and assuming the distributions generating the public and private data satisfy certain properties. We show that the answer to this appears to be quite subtle and closely related to the average-case complexity of a new multi-task, missing-data version of the classic problem of phase retrieval. Motivated by this connection, we design a provable algorithm that can recover private vectors using only the public vectors and synthetic vectors generated by InstaHide, under the assumption that the private and public vectors are isotropic Gaussian.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/02/2021

Symmetric Boolean Factor Analysis with Applications to InstaHide

In this work we examine the security of InstaHide, a recently proposed s...
research
03/14/2022

Reasoning over Public and Private Data in Retrieval-Based Systems

Users and organizations are generating ever-increasing amounts of privat...
research
08/11/2023

Private Distribution Learning with Public Data: The View from Sample Compression

We study the problem of private distribution learning with access to pub...
research
06/02/2013

Phase Retrieval using Alternating Minimization

Phase retrieval problems involve solving linear equations, but with miss...
research
06/11/2015

Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs

An announcement scheme is a system that facilitates vehicles to broadcas...
research
11/16/2020

Secured Distributed Algorithms without Hardness Assumptions

We study algorithms in the distributed message-passing model that produc...
research
07/16/2019

A New Distribution Version of Boneh-Goh-Nissim Cryptosystem: Security and performance analysis

The aim of this paper is to provide two distributed versions of the Bone...

Please sign up or login with your details

Forgot password? Click here to reset