Separating Key Agreement and Computational Differential Privacy

04/14/2023
by   Vipul Arora, et al.
0

Two party differential privacy allows two parties who do not trust each other, to come together and perform a joint analysis on their data whilst maintaining individual-level privacy. We show that any efficient, computationally differentially private protocol that has black-box access to key agreement (and nothing stronger), is also an efficient, information-theoretically differentially private protocol. In other words, the existence of efficient key agreement protocols is insufficient for efficient, computationally differentially private protocols. In doing so, we make progress in answering an open question posed by Vadhan about the minimal computational assumption needed for computational differential privacy. Combined with the information-theoretic lower bound due to McGregor, Mironov, Pitassi, Reingold, Talwar, and Vadhan in [FOCS'10], we show that there is no fully black-box reduction from efficient, computationally differentially private protocols for computing the Hamming distance (or equivalently inner product over the integers) on n bits, with additive error lower than O(√(n)/e^ϵlog(n)), to key agreement. This complements the result by Haitner, Mazor, Silbak, and Tsfadia in [STOC'22], which showed that computing the Hamming distance implies key agreement. We conclude that key agreement is strictly weaker than computational differential privacy for computing the inner product, thereby answering their open question on whether key agreement is sufficient.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/17/2021

On the Complexity of Two-Party Differential Privacy

In distributed differential privacy, the parties perform analysis over t...
research
05/03/2021

Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation

Consider a PPT two-party protocol π=(A,B) in which the parties get no pr...
research
05/03/2021

Computational Two-Party Correlation: A Dichotomy for Key-Agreement Protocols

Let π be an efficient two-party protocol that given security parameter κ...
research
05/15/2023

Privacy Auditing with One (1) Training Run

We propose a scheme for auditing differentially private machine learning...
research
09/28/2020

On the Round Complexity of the Shuffle Model

The shuffle model of differential privacy was proposed as a viable model...
research
08/17/2022

Necessary Conditions in Multi-Server Differential Privacy

We consider protocols where users communicate with multiple servers to p...
research
05/03/2021

On the Complexity of Fair Coin Flipping

A two-party coin-flipping protocol is ϵ-fair if no efficient adversary c...

Please sign up or login with your details

Forgot password? Click here to reset