The power of synergy in differential privacy:Combining a small curator with local randomizers

12/18/2019
by   Amos Beimel, et al.
0

Motivated by the desire to bridge the utility gap between local and trusted curator models of differential privacy for practical applications, we initiate the theoretical study of a hybrid model introduced by "Blender" [Avent et al.,USENIX Security '17], in which differentially private protocols of n agents that work in the local-model are assisted by a differentially private curator that has access to the data of m additional users. We focus on the regime where m << n and study the new capabilities of this (m,n)-hybrid model. We show that, despite the fact that the hybrid model adds no significant new capabilities for the basic task of simple hypothesis-testing, there are many other tasks (under a wide range of parameters) that can be solved in the hybrid model yet cannot be solved either by the curator or by the local-users separately. Moreover, we exhibit additional tasks where at least one round of interaction between the curator and the local-users is necessary – namely, no hybrid model protocol without such interaction can solve these tasks. Taken together, our results show that the combination of the local model with a small curator can become part of a promising toolkit for designing and implementing differential privacy.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/20/2019

Outis: Crypto-Assisted Differential Privacy on Untrusted Servers

Differential privacy has steadily become the de-facto standard for achie...
research
07/02/2018

An Algorithmic Framework For Differentially Private Data Analysis on Trusted Processors

Differential privacy has emerged as the main definition for private data...
research
11/29/2018

The Power of The Hybrid Model for Mean Estimation

In this work we explore the power of the hybrid model of differential pr...
research
08/17/2022

Necessary Conditions in Multi-Server Differential Privacy

We consider protocols where users communicate with multiple servers to p...
research
09/28/2020

On the Round Complexity of the Shuffle Model

The shuffle model of differential privacy was proposed as a viable model...
research
11/08/2019

The Complexity of Verifying Circuits as Differentially Private

We study the problem of verifying differential privacy for straight line...
research
08/28/2023

Zip to Zip-it: Compression to Achieve Local Differential Privacy

Local differential privacy techniques for numerical data typically trans...

Please sign up or login with your details

Forgot password? Click here to reset