The power of synergy in differential privacy: Combining a small curator with local randomizers

Amos Beimel, Aleksandra Korolova, Kobbi Nissim, Or Sheffet, Uri Stemmer

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

Motivated by the desire to bridge the utility gap between local and trusted curator models of differential privacy for practical applications, we initiate the theoretical study of a hybrid model introduced by “Blender” [Avent et al., USENIX Security’17], in which differentially private protocols of n agents that work in the local-model are assisted by a differentially private curator that has access to the data of m additional users. We focus on the regime where m n and study the new capabilities of this (m,n)-hybrid model. We show that, despite the fact that the hybrid model adds no significant new capabilities for the basic task of simple hypothesis-testing, there are many other tasks (under a wide range of parameters) that can be solved in the hybrid model yet cannot be solved either by the curator or by the local-users separately. Moreover, we exhibit additional tasks where at least one round of interaction between the curator and the local-users is necessary – namely, no hybrid model protocol without such interaction can solve these tasks. Taken together, our results show that the combination of the local model with a small curator can become part of a promising toolkit for designing and implementing differential privacy.

Original languageEnglish
Title of host publication1st Conference on Information-Theoretic Cryptography, ITC 2020
EditorsYael Tauman Kalai, Adam D. Smith, Daniel Wichs
PublisherSchloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing
ISBN (Electronic)9783959771511
DOIs
StatePublished - 1 Jun 2020
Event1st Conference on Information-Theoretic Cryptography, ITC 2020 - Virtual, Boston, United States
Duration: 17 Jun 202019 Jun 2020

Publication series

NameLeibniz International Proceedings in Informatics, LIPIcs
Volume163
ISSN (Print)1868-8969

Conference

Conference1st Conference on Information-Theoretic Cryptography, ITC 2020
Country/TerritoryUnited States
CityVirtual, Boston
Period17/06/2019/06/20

Bibliographical note

Publisher Copyright:
© Amos Beimel, Aleksandra Korolova, Kobbi Nissim, Or Sheffet, and Uri Stemmer; licensed under Creative Commons License CC-BY

Funding

Work of A. B. and K. N. was supported by NSF grant No. 1565387 TWC: Large: Collaborative: Computing Over Distributed Sensitive Data. This work was done when A. B. was hosted by Georgetown University. Work of A. B. was also supported by ISF grant no. 152/17, a grant from the Cyber Security Research Center at Ben-Gurion University, and ERC grant 742754 (project NTSC). Work of A. K. was supported by NSF grant No. 1755992 CRII: SaTC: Democratizing Differential Privacy via Algorithms for Hybrid Models, a VMWare fellowship, and a gift from Google. Work of O. S. was supported by grant #2017–06701 of the Natural Sciences and Engineering Research Council of Canada (NSERC). The bulk of this work was done when O. S. was affiliated with the University of Alberta, Canada. Work of U. S. was supported in part by the Israel Science Foundation (grant No. 1871/19).

FundersFunder number
National Science Foundation1565387
Horizon 2020 Framework Programme1755992, 742754
Iowa Science Foundation152/17
Natural Sciences and Engineering Research Council of Canada
European Commission2017–06701
Israel Science Foundation1871/19
Ben-Gurion University of the Negev

    Keywords

    • Differential privacy
    • Hybrid model
    • Local model
    • Private learning

    Fingerprint

    Dive into the research topics of 'The power of synergy in differential privacy: Combining a small curator with local randomizers'. Together they form a unique fingerprint.

    Cite this