Abstract
Motivated by the desire to bridge the utility gap between local and trusted curator models of differential privacy for practical applications, we initiate the theoretical study of a hybrid model introduced by “Blender” [Avent et al., USENIX Security’17], in which differentially private protocols of n agents that work in the local-model are assisted by a differentially private curator that has access to the data of m additional users. We focus on the regime where m n and study the new capabilities of this (m,n)-hybrid model. We show that, despite the fact that the hybrid model adds no significant new capabilities for the basic task of simple hypothesis-testing, there are many other tasks (under a wide range of parameters) that can be solved in the hybrid model yet cannot be solved either by the curator or by the local-users separately. Moreover, we exhibit additional tasks where at least one round of interaction between the curator and the local-users is necessary – namely, no hybrid model protocol without such interaction can solve these tasks. Taken together, our results show that the combination of the local model with a small curator can become part of a promising toolkit for designing and implementing differential privacy.
Original language | English |
---|---|
Title of host publication | 1st Conference on Information-Theoretic Cryptography, ITC 2020 |
Editors | Yael Tauman Kalai, Adam D. Smith, Daniel Wichs |
Publisher | Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing |
ISBN (Electronic) | 9783959771511 |
DOIs | |
State | Published - 1 Jun 2020 |
Event | 1st Conference on Information-Theoretic Cryptography, ITC 2020 - Virtual, Boston, United States Duration: 17 Jun 2020 → 19 Jun 2020 |
Publication series
Name | Leibniz International Proceedings in Informatics, LIPIcs |
---|---|
Volume | 163 |
ISSN (Print) | 1868-8969 |
Conference
Conference | 1st Conference on Information-Theoretic Cryptography, ITC 2020 |
---|---|
Country/Territory | United States |
City | Virtual, Boston |
Period | 17/06/20 → 19/06/20 |
Bibliographical note
Publisher Copyright:© Amos Beimel, Aleksandra Korolova, Kobbi Nissim, Or Sheffet, and Uri Stemmer; licensed under Creative Commons License CC-BY
Funding
Work of A. B. and K. N. was supported by NSF grant No. 1565387 TWC: Large: Collaborative: Computing Over Distributed Sensitive Data. This work was done when A. B. was hosted by Georgetown University. Work of A. B. was also supported by ISF grant no. 152/17, a grant from the Cyber Security Research Center at Ben-Gurion University, and ERC grant 742754 (project NTSC). Work of A. K. was supported by NSF grant No. 1755992 CRII: SaTC: Democratizing Differential Privacy via Algorithms for Hybrid Models, a VMWare fellowship, and a gift from Google. Work of O. S. was supported by grant #2017–06701 of the Natural Sciences and Engineering Research Council of Canada (NSERC). The bulk of this work was done when O. S. was affiliated with the University of Alberta, Canada. Work of U. S. was supported in part by the Israel Science Foundation (grant No. 1871/19).
Funders | Funder number |
---|---|
National Science Foundation | 1565387 |
Horizon 2020 Framework Programme | 1755992, 742754 |
Iowa Science Foundation | 152/17 |
Natural Sciences and Engineering Research Council of Canada | |
European Commission | 2017–06701 |
Israel Science Foundation | 1871/19 |
Ben-Gurion University of the Negev |
Keywords
- Differential privacy
- Hybrid model
- Local model
- Private learning